Flashpoint · 1 day ago
DOD Skillbridge - Intelligence
Maximize your interview chances
Business IntelligenceCyber Security
No H1B
Insider Connection @Flashpoint
Get 3x more responses when you reach out via email instead of LinkedIn.
Responsibilities
Leverage internal tools to identify risks and produce tactical and operational level reports on behalf of customers and verticals.
Analyze high volumes of content from unindexed areas of the internet, assessing potential risks to customers.
Translate a wide variety of collected data sets from Deep and Dark Web sources.
Identify, transcribe, and summarize pertinent factual information on behalf of a wide range of customers.
Quickly understand and deliver on company and customer requirements.
Assist team members during peak activity periods to ensure the timeliness of high-quality data.
Monitor work queues as needed to maintain balanced workloads and achieve turn-around standards, ensuring data quality.
Analyze vendor security advisories, research vulnerability reports, mailing lists, product changelogs, news articles, bug trackers, commits, exploits, and many other sources to identify issues that constitute legitimate vulnerabilities (sources are provided) in order to author a detailed vulnerability entry based on findings.
Analyze and review new vulnerabilities for inclusion into the VulnDB product and update existing vulnerability entries with details, references, product information, exploit availability, and solutions.
Support technical analysis of malware
Identification of new and exploited vulnerabilities in-the-wild
Handle live interactive client engagements when high impact events occur (e.g. major cyber or physical attacks, Rapid Risk Response)
Produce quality analytic judgments that provide additional context to clients
Support editing and review of intelligence production deliverables within set deadlines
Conduct initial review of some additional finished intelligence reports
Prepare intelligence reports for publication for internal and external stakeholders
Strong attention to detail; ability to correct grammar and punctuation errors and adhere to style guidelines
Ability to recognize and begin to correct higher-level editorial and writing issues.
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
Current Active Duty Service Member
Meets DoD SkillBridge Qualifications
Available to participate 90-180 days
Work remotely in the continental US
Reading comprehension, attention to detail, and deductive reasoning.
Writing skills and affinity for writing research papers and summarizing complex subjects into short entries.
Self-motivation and the ability to work independently and in collaboration with others.
Knowledge of emerging multi-domain threats.
Familiarity with the intelligence cycle.
Preferred
Compassion for customer needs and desire to work in client-sense business.
Knowledge of common security software and hardware vulnerabilities and attack vectors. Familiarity with OWASP top 20.
Some experience with vulnerability exploit development would be helpful, as well as familiarity with security assessment tools and techniques.
Understanding Windows and Linux operating systems concepts, access controls, and privilege levels.
Familiarity with many more widely used web applications, client and server software, and web browsers.
Understanding of secure coding practices, cryptography, and authentication protocols.
In-depth knowledge of security and network fundamentals, such as cryptography, authentication, access control, and network protocols (TCP/IP, UDP, DNS, HTTP, etc.)
Programming experience with scripted languages (preferably Python3) and compiled languages (preferably C).
Experience in conducting security testing, vulnerability and network scanning, and penetration testing.
Ability to write efficient and secure code for vulnerability research and exploit development purposes.
Ability to set up a system to test a researched vulnerability, verify PoCs, and exploits of the vulnerabilities.
Experience with slack automation or business rules automation.
Excellent problem-solving and analytical skills to identify and address security vulnerabilities effectively.
Experience with Python, C++, or other programming languages.
Experience reviewing or analyzing malware logs, malware analysis, reversing, or penetration testing.
Ability to recognize inefficiencies to be addressed by process improvements or automation.
Knowledge in cyber domain and emerging threats.
Editing experience.
Understanding of basics of the cyber and physical threat landscapes.
Understanding of current events as they relate to security and intelligence.
Company
Flashpoint
The globally trusted leader in risk intelligence.
Funding
Current Stage
Late StageTotal Funding
$49MKey Investors
GeorgianGreycroftTechOperators
2021-07-21Acquired· by Audax Private Equity
2019-10-16Series D· $6M
2017-07-12Series C· $28M
Recent News
Business Wire
2023-12-06
secondariesinvestor.com
2023-10-31
Company data provided by crunchbase