Responsibilities
Evaluate current and emerging tools and best practices for tracking advanced persistent threats, tools, techniques, and procedures (TTPs) of attacker’s motivations, industry and attacker trends.
Perform tactical, and operational research and analysis of adversarial cyber threats.
Correlate intelligence, to develop understandings of tracked threat activity.
Present tactical intelligence about threat groups, the methodologies they use, and the motivations behind their activity.
Prepare and deliver briefings and reports to the client’s executives, security team, or analysts.
Minimum qualifications:
Bachelor's degree or equivalent practical experience.
7 years of experience in an investigative role involved in the production of threat intelligence for decision-makers/customers and involved in direct customer support.
Experience in an operational role involved in the research and writing of threat intelligence products for decision-makers/customers.
Preferred qualifications:
Experience in program management or business.
Experience in using tools for analysis such as intrusion operations, enterprise security controls, log analysis, network flow and traffic analysis, incident response processes, cyber attack life-cycles and models.
Experience working in a government environment and with host and network forensic reports of electronic media, packet capture, log data analysis, malware triage and network.
Experience with malware/security, Google products, and working in an investigative or incident response environment.
Understanding of cyber security concepts, common enterprise IT infrastructure components, operating system internals and networking.
You will be redirected to the company website to apply for this position