At Optiv, we’re on a mission to help our clients make their businesses more secure. We’re one of the fastest-growing companies in a truly essential industry. In your role at Optiv, you’ll be inspired by a team of the brightest business and technical minds in cybersecurity. We are passionate champions for our clients and know from experience that the best solutions for our clients’ needs come from working hard together. As part of our team, your voice matters, and you will do important work that has an impact, on people, businesses, and nations. Our industry and our company move fast, and you can be sure that you will always have room to learn and grow. We’re proud of our team and the important work we do to build confidence for a more connected world.
How you'll make an impact
- Employ analytical tradecraft and analysis of intelligence with measurable, actionable intelligence outcomes that drive value for Optiv and our clients.
- Establish, maintain, and mature priority intelligence requirements (PIRs).
- Perform social media platform collections and analysis.
- Utilize open-source tools to collect, investigate, and validate client security concerns.
- Maintain and utilize Digital Risk Protection Management (DRPM) software solutions.
- Collaborate with clients to identify and recommend use cases, workflows, and outcomes.
- Dissemination of intelligence and recursive maturation of intelligence over time to drive value. This includes but is not limited to intelligence feeds (e.g., blacklists, IOCs), vulnerability notifications, briefings, advisories, intelligence reports, and request for information (RFI) reports.
- Support operations and maintenance of the Cyber Threat Intelligence (CTI) platform and service and any other technologies in support of the Intelligence team.
- Strong analytical tradecraft and critical thinking skills.
- Undergraduate degree or three years or more experience in the field of computer science or cyber intelligence.
- Shift flexibility, including the ability to provide on-call support when needed, with up to 10 percent travel.
- Able to work independently and works well within a team.
- Proven written and oral communication skills, especially in the area of reporting writing, use of estimative intelligence language, and communication with clients.
- Proven experience as an intelligence analyst, including but not limited to open-source intelligence (OSINT) collections.
- Solid understanding and ability to identify phishing attacks, social engineering, and domain impersonation.
- Working knowledge of MITRE ATT&CK and other intelligence cycles, models, and mapping solutions.
- Working knowledge of computer network security defenses, including an understanding of common hardware, architecture, protocols, and analysis.
- Proficient in the use of Microsoft Office and similar productivity software for word processing, spreadsheet, and presentation.
What we are looking for
- 5+ Years of experience on threat intelligence analysis
- Must have strong hands-on Recorded Future
- Experience in deep and dark web collection methods.
- Strong knowledge of malware research and response, including static and behavioral analysis, debugging, and reverse engineering.
- Counter-intelligence and defensive controls experience.
- Scripting (e.g., Python, Bash) and API integration experience.
- Fundamental knowledge of Threat Hunting related to identifying and extracting threats within computer networks, email, and similar sources from files such as PCAP and EML. Including a fundamental knowledge of threat hunting tools.
- Security certifications (OSCP, SANS GIAC, CMI, CEH, Cisco Security, Security +, CISSP, or other security certifications).
- Intelligence trends and metrics monitoring and reporting experience.
- Former cyber research and response or malware role with government, military or law enforcement experience.
- Vulnerability Assessment & Remediation.
- Experience with mobile threats and packages, including Java, APK, and iOS-based analysis.
What you can expect from Optiv
- A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups.
- Work/life balance
- Professional training resources
- Creative problem-solving and the ability to tackle unique, complex projects
- Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities.
- The ability and technology necessary to productively work remotely/from home (where applicable)
EEO Statement
Optiv is an equal opportunity employer (EEO). All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, status as an individual with a disability, veteran status, or any other basis protected by federal, state, or local law.
Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.
Top Skills
What We Do
Optiv is a security solutions integrator – “one-stop” trusted partner with a singular focus on cybersecurity. Our end-to-end cybersecurity capabilities span risk management and transformation, cyber digital transformation, threat management, security operations, identity and data management, and integration and innovation, helping organizations realize stronger, simpler and more cost-efficient cybersecurity programs that support business requirements and outcomes. At Optiv, we are modernizing cybersecurity to enable clients to innovate their consumption models, integrate infrastructure and technology to maximize value, achieve measurable outcomes, and realize complete solutions and business alignment.