Sr. Cyber Threat Intelligence Analyst
Apply NowCompany: STEM Solutions
Location: Fredericksburg, VA 22407
Description:
Sr. Cyber Threat Intelligence Analyst
We are currently hiring a Sr. Cyber Threat Intelligence Analyst to support a federal agency. Must be a US Citizen and pass background check.
Position Location:
Position Description:
Responsible for anticipating and responding effectively to cyber threats. Leverages advanced knowledge of cyber threat actors, tactics, techniques and procedures (TTPs) to assist the Government in collecting assessing, and disseminating actionable intelligence on emerging and evolving threats. Conducts in-depth research and analysis of threat indicators, including malware, phishing campaigns and infrastructure, to uncover patterns and trends indicative of potential cyber-attacks. Collaborates closely with internal teams and external partners to enhance threat detection capabilities, develop threat hunting strategies and optimize security controls.
Key Responsibilities:
Required Experience:
Required Education and Certifications:
We are currently hiring a Sr. Cyber Threat Intelligence Analyst to support a federal agency. Must be a US Citizen and pass background check.
Position Location:
- This position is on-site at the client's Washington D.C. headquarters.
Position Description:
Responsible for anticipating and responding effectively to cyber threats. Leverages advanced knowledge of cyber threat actors, tactics, techniques and procedures (TTPs) to assist the Government in collecting assessing, and disseminating actionable intelligence on emerging and evolving threats. Conducts in-depth research and analysis of threat indicators, including malware, phishing campaigns and infrastructure, to uncover patterns and trends indicative of potential cyber-attacks. Collaborates closely with internal teams and external partners to enhance threat detection capabilities, develop threat hunting strategies and optimize security controls.
Key Responsibilities:
- Identify emerging threats, vulnerabilities, and attack trends based on information from various sources, including open-source research, dark web forums, and threat intelligence feeds
- Conduct in-depth analysis of cyber threat intelligence data to identify patterns, trends, and indicators of compromise (IOCs) associated with potential cyber-attacks
- Produce high-quality written and oral reports, briefings, and presentations to communicate cyber threat intelligence findings, assessments, and recommendations to senior leadership, stakeholders, and technical teams in a clear and actionable manner
- Proactively search for signs of malicious activity within the organization's network and systems utilizing threat intelligence to identify and investigate potential security incidents or anomalies
- Enhance the organization's cyber threat intelligence capabilities and methodologies in accordance with the latest cybersecurity threats, trends, and technologies
- Contribute to the development of cybersecurity strategies, policies, and procedures based on threat intelligence insights and analysis
- Participate in information sharing initiatives and collaborate with industry peers, government agencies, and cybersecurity communities to exchange threat intelligence and enhance collective cyber defense capabilities
- Collaborate with vulnerability management teams to prioritize and assess the severity of vulnerabilities based on threat intelligence data, enabling informed decisions on patching and remediation efforts
- Provide written recommendations on Government drafts of executive summaries and briefings
- Provide recommendations and input on other content and presentations
- Incorporate data from Mandiant, federal partners, and other vendors to expand threat awareness and bolster proactive defense strategies
- Examine malware samples from diverse sources using reverse engineering techniques to uncover capabilities, origins, and threat actor methodologies
- Detect and study emerging vulnerabilities, attack trends, and threat patterns through internal data, open-source intelligence, and integrated feeds from trusted platforms
- Use Splunk and other tools to identify unusual activities, create actionable alerts, and monitor potential security incidents in real time
Required Experience:
- 10 years of experience in conducting in-depth analysis of cyber threats, including malware, phishing campaigns, and other attack vectors
- 10 years of experience in collecting and aggregating threat intelligence from various sources, such as open source intelligence (OSINT), dark web forums, and commercial threat intelligence feeds
- 10 years of experience in producing written and oral reports, briefings, and presentations to communicate threat intelligence findings, assessments, and recommendations to stakeholders at all levels of the organization
- 5 years of experience with Microsoft Office tools (Word, PowerPoint, Excel, OneNote)
- 5 years of experience using cybersecurity tools and technologies for threat intelligence analysis, such as threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and malware analysis tools
Required Education and Certifications:
- Bachelor's degree in Cybersecurity
- Security+
- Network+ or equivalent (preferred)