Job Details

ID #31561155
State Virginia
City Ashburn
Full-time
Salary USD TBD TBD
Source verizon
Showed 2022-01-14
Date 2022-01-14
Deadline 2022-03-15
Category Et cetera
Create resume

Senior Cyber Analyst

Virginia, Ashburn, 20146 Ashburn USA

Vacancy expired!

When you join VerizonVerizon is one of the world’s leading providers of technology and communications services, transforming the way we connect across the globe. We’re a diverse network of people driven by our shared ambition to shape a better future. Here, we have the ability to learn and grow at the speed of technology, and the space to create within every role. Together, we are moving the world forward – and you can too. Dream it. Build it. Do it here.What you’ll be doingThe Verizon Threat Research Advisory Team within Verizon’s Professional Services is seeking Threat Intelligence Hunters/Analysts (Analysts) who will play a critical role in protecting Verizon’s customers, from current and future cyber threats. This position will support our customer’s overall cyber threat analysis efforts.Apply scientific and technical knowledge to solving complex threat intelligence problems and produce strategic, operational and tactical level written assessments.

Brief organizations such as Fortune 500 companies on their findings and have enough understanding to answer tough questions by C-Level executives in the organization.

Utilize understanding of the hacker mindset and methods used to carry out their objectives.

Work independently and be self-motivated.

Use experience and knowledge in identifying threats that pose a significant risk to their customer’s organization to identify when there is no threat or risk at all.

Generate, collect, and enrich focused threat intelligence.

Contribute significantly to wider team investigations and research.

Subject Matter Expert (SME) for cyber threat actors TTPs.

Where you'll be working:In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager."What we’re looking forYou’ll need to have:Bachelor’s degree or four or more years of work experience.

Four or more years of relevant work experience.

Three or more years of experience researching, investigating and tracking threat actors and threat groups in the cybercrime ecosystem.

Experience analyzing computer and network related data and logs to uncover threats and IOC's.

Experience tracking nation-state threat actors and other cyber criminals.

Working knowledge of IP networking and services.

Willingness to travel.

Valid driver's license.

Foundational knowledge of operating system concepts as it relates to the network stack (client & server).

Even better if you have:Bachelor degree (Computer Science, Cyber Security, Electronics, Investigations).

Ability to work effectively in a remote distributed team environment.

Experience with intelligence analysis, including analytic tradecraft.

Proven threat hunting experience (PCAP diagnoses).

Data science and analytics experience including aggregating, manipulating, examining, mining, exporting, reporting, and visualizing threat intelligence and incident data.

Experience with Linux/Unix and an understanding of database technologies.

Investigative experience and mindset.

Intelligence, Counterintelligence and/or Cyber Investigations and Operations experience.

Experience as a cyber threat intel analyst or special agent for Cyber Command, Homeland Security, NCIS, OSI, FBI or equivalent cyber investigations agency or public company as an incident responder, penetration tester, malware analyst or midlevel to senior SOC/CERT analyst.

Ability to continually look to improve current processes, think outside the box and constantly evaluate better more efficient.

Firm grasp of link-analysis methods and software (Maltego, Palantir, Analyst Notebook).

Ability to quickly develop effective solutions to unique problems using a combination of existing tools and custom code/scripts.

Ability to program with C, Python, Pearl, R, G or other language.

Ability to script with PowerShell, Python or other language.

Up-to-date on current hacking techniques, vulnerability disclosures, data breach incidents, and security analysis techniques.

Background with enterprise security products, such as firewalls, next gen firewalls, IDPS, WAF, AV, content and URL filtering.

Experiencewith concepts and technologies related to Elasticsearch, Logstash, Kibana, Hadoop and data reduction technologies.

Proven ability to design, draft, and publish high-quality technical and business-level reports, studies, whitepapers, and blogs.

Open source intelligence techniques and proficiency with multiple tools or distributions of tools such as Kali or Buscador.

Industry certifications, such as: GSEC, GCIH, GCTI, OSCP, GCFE, GCFA, GCIA, GPEN, GREM, GNFA.

#VZProfessionalservicesEqual Employment OpportunityWe're proud to be an equal opportunity employer - and celebrate our employees' differences, including race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, and Veteran status. At Verizon, we know that diversity makes us stronger. We are committed to a collaborative, inclusive environment that encourages authenticity and fosters a sense of belonging. We strive for everyone to feel valued, connected, and empowered to reach their potential and contribute their best. Check out our diversity and inclusion (https://www.verizon.com/about/careers/work-culture) page to learn more.COVID-19 Vaccination RequirementVerizon requires new hires to be fully vaccinated against COVID-19. Verizon provides reasonable accommodations consistent with legal requirements (e.g., for medical or religious reasons).REQNUMBER: 589502-1D

Vacancy expired!

Subscribe Report job