Job Details

ID #12320412
State Washington
City Washington
Job type Full-time
Salary USD TBD TBD
Source FireEye, Inc.
Showed 2021-04-16
Date 2021-04-03
Deadline 2021-06-02
Category Et cetera
Create resume

Senior Analyst (Remote Southeast Region, US)

Washington, Washington 00000 Washington USA

Vacancy expired!

Job Description

If you have a strong background in analysis and are looking to be at the forefront of the cyber threat intelligence field, then we want to hear from you! The successful candidate should be a self-motivated and independent, critical thinker skilled in the application of threat intelligence for the enablement of a customer’s network security. The analyst will address a customer’s threat intelligence needs and leverage Mandiant FireEye’s unique knowledge to produce informative products, briefs, and have understanding of the entire CTI Lifecycle, from guiding the organizations strategic direction for CTI, establishing a robust collections and processing framework, organizing analysis best practices, instituting production requirements, and developing dissemination protocols aligned to stakeholder requirements

Responsibilities:

  • Work with customers to determine their intelligence needs and requirements, and identify the most effective methods for fulfilling these unique requirements
  • Conduct extensive research into current threat activity to determine customer-relevant threat intelligence
  • Produce briefing material, written products, and simple graphics in order to convey analysis both verbally and in writing to a variety of audiences
  • Present tactical, operational, and strategic intelligence about threat groups, the methodologies they use, and the motivations behind their activity
  • Correlate threat intelligence from the customer’s industry/region to observed activity impacting the customer
  • Evaluate current and emerging tools and best-practices for tracking advanced persistent threats; tools, techniques, and procedures (TTPs) of attacker’s motivations, industry and attacker trends
  • Ability to work with minimal direct oversight, maintaining high quality analytical production and excellent customer relationship
  • Develop core threat intelligence capability and subject matter expertise
  • Support CTI capability maturation
  • Support CTI stakeholder identification and requirements gathering
  • Support adjustments and tuning to existing CTI procedures
  • Integrate CTI analyst activities into existing cyber defense functions (i.e. SOC, IR)
  • Develop an organizational Threat Profile based on industry, geo location, critical assets etc.

Qualifications

  • 3 + years of experience in an analytical role of either network forensics analyst, intelligence threat analyst, or security engineer/ consultant
  • 3 + years of experience in investigative or incident response environments
  • 3 + years working in a customer-facing environment
  • Exceptional oral and written communication skills
  • Excellent communication and presentation skills with the ability to present to a variety of internal audiences including senior leadership
  • Excellent organizational skills with the ability to prioritize and execute in a disciplined manner
  • Outstanding communication and interpersonal abilities, with the ability to adapt to a variety of customer personalities
  • Ability to set and manage expectations with senior stake-holders and team members
  • Demonstrated ability to manage customer relationships

·Strong understanding and experience related to:

  • Threat Intelligence analysis and experience managing and implementing the threat intelligence lifecycle
    • Common malware variants, functionality, and basics of static and dynamic analysis
    • Common threat actor tactics, techniques, and procedures
    • Threat Intelligence Platform (TIP) usage and best practices
    • Cyber Attack Lifecycles and Threat Models
    • Cyber Security-related process development
    • Proven written and oral communication skills and ability to quickly document research and analysis
    • Experience conducting executive debriefs of deliverables and project outcomes
    • Excellent time management skills
    • Research best practices and topic analysis

Technical Qualifications:

  • Experience in evaluating forensic reports of electronic media, packet capture, log data, and network devices in support of intrusion analysis or enterprise level information security operations
  • Experience in working with threat modeling systems
  • Broad understanding of network architecture and network security methods (web content filtering, domain reputation policy, snort signatures, host-based analysis systems (HBSS, HX), email analysis)
  • Ability to interact with their user interfaces
  • Experience with basic malware analysis; the tactics, tools, techniques, and procedures of network intrusion activity

Additional Qualifications:

  • Bachelor’s or other professional degree preferred
  • Malware/security experience and experience with Mandiant FireEye products, highly desired
  • Previous experience in a customer facing role and/or consulting expertise
  • Strong understanding of threat intelligence analysis and application, while conveying strategic outcomes to executive audiences
  • Scripting capabilities in Python and/or Bash
  • Knowledge of various operating systems

Additional Information

At FireEye we are committed to our #OneTeam approach combining diversity, collaboration, and excellence. All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability.

This is aregionally-basedrole that mustbe located in the Southeastregion of the US with preference to Virginia, Maryland, and Washington DC.

Vacancy expired!

Subscribe Report job