Sr. Cyber Threat Intelligence Analyst jobs in United States
cer-icon
Apply on Employer Site
company-logo

cFocus Software Incorporated · 2 months ago

Sr. Cyber Threat Intelligence Analyst

cFocus Software Incorporated is seeking a Senior Cyber Threat Intelligence Analyst to join their program supporting AOUSC. The role involves conducting in-depth analysis of cyber threats, producing reports, and enhancing the organization's threat intelligence capabilities.

ChatbotGovernmentInformation TechnologySoftware
check
Growth Opportunities
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Identify emerging cyber threats, vulnerabilities, and attack trends based on information from various sources, including open-source research, dark web forums, and threat intelligence feeds
Conduct in-depth analysis of cyber threat intelligence data to identify patterns, trends, and indicators of compromise (IOCs) associated with potential cyber-attacks. This includes analyzing malware samples, phishing emails, and other threat artifacts to understand threat actor TTPs
Produce high-quality written and oral reports, briefings, and presentations to communicate cyber threat intelligence findings, assessments, and recommendations to senior leadership, stakeholders, and technical teams in a clear and actionable manner
Proactively search for signs of malicious activity within the organization's network and systems utilizing threat intelligence to identify and investigate potential security incidents or anomalies
Enhance the organization's cyber threat intelligence capabilities and methodologies in accordance with the latest cybersecurity threats, trends, and technologies
Contribute to the development of cybersecurity strategies, policies, and procedures based on threat intelligence insights and analysis, helping to prioritize security investments and initiatives to mitigate emerging threats effectively
Provide mentorship, guidance, and training to other contractor’s employees, including sharing knowledge and best practices to build a skilled and cohesive cyber threat intelligence team
Participate in information sharing initiatives and collaborate with industry peers, government agencies, and cybersecurity communities to exchange threat intelligence and enhance collective cyber defense capabilities
Collaborate with vulnerability management teams to prioritize and assess the severity of vulnerabilities based on threat intelligence data, enabling informed decisions on patching and remediation efforts
Provide written recommendations on Government drafts of executive summaries and briefings
Provide recommendations and input on other content and presentations
Incorporate data from Mandiant, federal partners, and other vendors to expand threat awareness and bolster proactive defense strategies
Examine malware samples from diverse sources using reverse engineering techniques to uncover capabilities, origins, and threat actor methodologies
Detect and study emerging vulnerabilities, attack trends, and threat patterns through internal data, open-source intelligence, and integrated feeds from trusted platforms
Use Splunk and other tools to identify unusual activities, create actionable alerts, and monitor potential security incidents in real time

Qualification

Cyber threat analysisThreat intelligence aggregationCybersecurity tools proficiencyMicrosoft Office ToolsSecurity + certificationNetwork + certificationWritten communicationOral communicationMentorship

Required

8 years' experience in conducting in-depth analysis of cyber threats, including malware, phishing campaigns, and other attack vectors. This involves identifying patterns, trends, and indicators of compromise (IOCs) to understand threat actor tactics, techniques, and procedures (TTPs)
8 years' experience in collecting and aggregating threat intelligence from various sources, such as opensource intelligence (OSINT), dark web forums, and commercial threat intelligence feeds. This includes evaluating the credibility and relevance of intelligence sources and identifying actionable intelligence for the organization
8 years' experience in producing high-quality written and oral reports, briefings, and presentations to communicate threat intelligence findings, assessments, and recommendations to stakeholders at all levels of the organization
5 years working in an office environment with technical IT personnel
5 years of experience with Microsoft Office Tools such as Word, PowerPoint, Excel, and OneNote
5 years of experience using cybersecurity tools and technologies for threat intelligence analysis, such as threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and malware analysis tools
Bachelor's degree in Cybersecurity preferred
Security + is required and Network + or equivalent is preferred

Company

cFocus Software Incorporated

twittertwitter
company-logo
cFocus Software automates FedRAMP compliance and develops government chatbots for the Azure Government Cloud, Office 365, and SharePoint.

Funding

Current Stage
Early Stage

Leadership Team

leader-logo
Manisha Griesinger, MPH, MSc
Program Manager | U.S. EPA Office of the Chief Financial Officer
linkedin
Company data provided by crunchbase