Strategic Cyber Intelligence Analyst

Sorry, this job was removed at 7:04 a.m. (CST) on Tuesday, April 26, 2022
Find out who's hiring in Atlanta, GA.
See all Data + Analytics jobs in Atlanta, GA
Apply
By clicking Apply Now you agree to share your profile information with the hiring company.

Job Description :

The position is described below. If you want to apply, click the Apply button at the top or bottom of this page. You'll be required to create an account or sign in to an existing one.

Need Help?

If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility or call 877-891-2510 (accommodation requests only; other inquiries won't receive a response).

Regular or Temporary:
Regular

Language Fluency: English (Required)

Work Shift:
1st shift (United States of America)

Please review the following job description:

Strategic Cyber Intelligence Analysts process, analyze, and report intelligence to preempt or reduce threat exposure. Strategic intelligence focuses on emerging threats or "over the horizon" threats. Specific attention is paid to threat actors' tactics, techniques, and procedures (TTPs), their motivation, intent, capability, and how threats or threat actors may target the organization (either directly or indirectly). They are responsible for providing context and prioritization information to both Operational Intelligence Analysts and Tactical Intelligence Analysts through the organizations Threat Management System, such as a Threat Intelligence Platform (TIP) or threat alert/reporting protocol. They must maintain a solid understanding of business operations and environment to determine the relevance of threat intelligence consumed, as well as the vectors of attack that may be exploited (whether technical or non-technical in nature).

THIS POSITION CAN BE 100% REMOTE

Essential Duties and Responsibilities

Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

1. Participate in escalated computer security incidents and cybersecurity investigations including computer forensics, network forensics, root cause analysis and malware analysis and execute on appropriate mitigation strategies for identified threats.

2. Serve as coordinator in the event of escalated cybersecurity threats/incidents for Tier 1 analysts.

3. Participate in the creation and maintenance of use cases for recurring investigation/incident triggers in support of the 24/7 Cybersecurity Threat Operations and Cybersecurity Threat Management program.

4. Participate in the creation and maintenance of playbooks used in response for investigation/incident triggers in support of 24/7 Cybersecurity Threat Operations and Cybersecurity Threat Management program.

5. Interface with other teams in Information Security (e.g. network operations, Cyber Threat Operations Center (CTOC), vulnerability management) along with information and liability risk officers and technology management to help guide cyber security investigations and incidents.

6. Deliver cyber intelligence services and material to enterprise technology and business leaders.

7. Identify new threat tactics, techniques and procedures used by cyber threat actors.

8. Participate in threat hunting activities to proactively search for threats in the enterprise environment.

Qualifications

Required Qualifications:

The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

1. Bachelor's degree in Computer Science or related field or equivalent education and related training

2. Five years of experience in Cybersecurity or related work

3. Broad knowledge of general IT with a focus area in two or more of the following areas: operating systems, networking, computer programing, web development or database administration 4. Demonstrated advanced knowledge of cyber security concepts with a focus area in two or more of the following: attack surface management, Security Operations Center (SOC) operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) use, threats (including Advanced Persistent Threat (APT), insider), vulnerabilities, and exploits; incident response, investigations and remediation

Preferred Qualifications:

. Ten years of experience in intelligence analysis/using threat intelligence to reduce risk and threat exposure

2. Strong understanding of the intelligence lifecycle, its component parts and how it can be applied across the organization to improve decision making processes

2. Industry certifications in general technology (e.g. Microsoft Certified Professional (MCP), Microsoft Certified Solutions Expert (MCSE), Network+)

3. Industry certifications in cyber security and forensics, GIAC Certified Incident Handler (GCIH) and other related credentials Industry certifications in networking, such as Cisco Certified Network Associate (CCNA), Certified Wireless Network Administrator (CWNA) and/or Net+

4. Fundamental analytic tradecraft skillsets, with extensive experience in the extraction and analysis of tactical intelligence from investigations

5. Strong negotiation and conflict management skills

6. Strong management skills and strong problem-solving skills

7. Ability to interface with executive level management and give senior level presentations

8. Five or more years of direct experience actively managing/using threat intelligence to reduce risk and threat exposure

9. In-depth knowledge of the cyber threat landscape and how to apply attacker motivation, capability and intent to an organizational threat landscape

10. Ability to author products at all audience levels, and peer review products with no supervisory input

11. Experience working with security vendors, such as submitting feature requests, evaluating products and analyzing security functionality

Other Job Requirements / Working Conditions

Sitting

Constantly (More than 50% of the time)

Visual / Audio / Speaking

Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.

Manual Dexterity / Keyboarding

Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.

Availability

Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need .

Travel

Minimal and up to 10%

Truist supports a diverse workforce and is an Equal Opportunity Employer who does not discriminate against individuals on the basis of race, gender, color, religion, national origin, age, sexual orientation, gender identity, disability, veteran status or other classification protected by law. Drug Free Workplace.

Thank you for your interest in Truist! BB&T and SunTrust have come together in a transformational merger of equals to create Truist, the premier financial organization in the country. You may notice references to our legacy company names, BB&T and SunTrust, in places throughout this site. All such references should be understood to refer to Truist moving forward while we continue to transition to the Truist name.

EEO is the Law Pay Transparency Nondiscrimination Provision E-Verify

More Information on SunTrust
SunTrust operates in the Fintech industry. The company is located in Atlanta, GA. SunTrust was founded in 1891. It has 15500 total employees. It offers perks and benefits such as Flexible Spending Account (FSA), Disability insurance, Dental insurance, Vision insurance, Health insurance and Life insurance. To see all jobs at SunTrust, click here.
Read Full Job Description
Apply Now
By clicking Apply Now you agree to share your profile information with the hiring company.

Similar Jobs

Apply Now
By clicking Apply Now you agree to share your profile information with the hiring company.
Learn more about SunTrustFind similar jobs