Cyber Threat Intel Analyst

Reposted 16 Days Ago
North Charleston, SC
In-Office
Mid level
Security • Cybersecurity
The Role
As a Cyber Threat Intelligence Analyst, analyze threats, provide recommendations, support incident response, and maintain compliance documentation.
Summary Generated by Built In

Cyber Threat Intel Analyst
North Charleston, SC
Minimum of a Top Secret Clearance, with ability to obtain TS/SCI
.

As a Cyber Threat Intelligence Analyst, you will be responsible for providing analysis on relevant threats to the customer environment in support of the overall defensive effort.  You will be a key component in providing additional tactical context surrounding adversarial TTPs and support to the Network Security Monitoring and Incident Response teams. Your primary responsibility is to analyze various sources of threat-related data using standard toolsets and methodologies, and then providing risk-related recommendations for action.

Position Requirements and Duties

  • Perform daily review of cyber threat warnings, bulletins, alerts, and incident reporting documentation
  • Conduct research on emerging security threats and provide correlation and trending of cyber incident activity
  • Maintain knowledge of adversary activities, including intrusion set tactics, techniques and procedures (TTPs)
  • Communicate events to agencies regarding intrusions and compromises to network infrastructure, applications and operating systems
  • Provide cyber threat assessments based on threat analysis, coordinate cyber threat tracking with other organizations and the government
  • Compile detailed investigation and analysis reports
  • Compile and maintain internal standard operating procedure (SOP) documentation
  • Ensure associated documentation and capabilities remain compliant with CJCSM 6510.01b and other applicable policy directives
  • Participates in program reviews, product evaluations, and onsite certification evaluations
  • Authorized to update signatures and view alerts of IDS/ IPS
  • Authorized to view audit records on Central Log Server
  • Authorized to modify auditable events on Central Log Server
  • Support incident response actions (Surge)
  • Up to 25% Travel may be required

Qualifications

  • US Citizen
  • At least 3 years of experience in Cybersecurity Service Provider (CSSP) environment or similar area
  • At least 3 years of experience with collecting, analyzing, and interpreting qualitative and quantitative data for the purposed of documenting results and analyzing finding to provide meaningful products
  • At least 3 years of experience with Cyber, defensive or offensive Cyber operations, information operations or information warfare, or topical Cyber expertise

Desired Qualifications

  • Bachelor’s degree or higher from accredited university/technical college
  • At least 5 years of experience in Cybersecurity Service Provider (CSSP) environment or similar area
  • Ability to write finished products based off of highly technical subject matter and analysis for dissemination to a less technical or non-technical audience
  • Ability to develop specific expertise, discerns patterns of complex threat actor behavior, and communicates a comprehension of current and developing Cyber threats
  • Ability to leverage online research tools to identify and navigate online forums, specialized websites, social media, and traditional sources
  • Knowledge of TCP/IP network communication protocols
  • Self-motivated and passionate
  • Possess excellent oral and written communication skills, including briefing to senior leadership and agency groups on a regular basis
  • Experience with analytic tool, including Augury, Splunk, Elastic, TAC, Palantir, Shodan, Analyst Notebook or other threat intelligence platform preferred
  • Experience collaborating and coordinating with intelligence community partners on Cyber issues and topics

Certification Requirements

  • 8570 Classification IAT –II & CSSP Certification

Top Skills

Analyst Notebook
Elastic
Palantir
Shodan
Splunk
Tac
Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: North Charleston, SC
90 Employees
Year Founded: 2015

What We Do

Adapt Forward specializes in Defensive and Offensive cyber operations. We strive to rewrite the rulebook on how Cyber Defense and Incident response is done with a unique blend of offense to validate our defense.

Similar Jobs

Hybrid
4 Locations
213000 Employees

Wells Fargo Logo Wells Fargo

Operations Processor

Fintech • Financial Services
Hybrid
Myrtle Beach, SC, USA
213000 Employees

Snap! Mobile Logo Snap! Mobile

Account Executive

Edtech • Fintech • Sports
Easy Apply
In-Office
Greenville, SC, USA
350 Employees
75-95 Annually

Ahold Delhaize USA Logo Ahold Delhaize USA

Platform Engineer

AdTech • eCommerce • Food • Marketing Tech • Retail
In-Office
Mauldin, SC, USA
10000 Employees
93K-160K Annually

Similar Companies Hiring

Silverfort Thumbnail
Security • Sales • Information Technology • Cybersecurity • Automation
GB
507 Employees
Oso Thumbnail
Software • Security • Infrastructure as a Service (IaaS)
New York, New York
36 Employees
Credal.ai Thumbnail
Software • Security • Productivity • Machine Learning • Artificial Intelligence
Brooklyn, NY

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account