Threat Intelligence Analyst

September 23

Apply Now
Logo of Business Wire

Business Wire

Public Relations • Press Release Distribution • Investor Relations • SEC filing • SEO

501 - 1000

Description

• Monitor specific cyber threat actors to understand their tactics, techniques, and procedures (TTPs), and leverage this knowledge to protect the organization. • Identify and analyze threats during the early stages of an attack or compromise, focusing on detecting threat actor activities, including exploitation and risk to critical systems. • Conduct proactive threat hunting to uncover hidden or unidentified threats, track down malicious agents already present in the network, and remove them from the environment. • Use a hypothesis-driven approach and behavioral analysis to uncover connections and correlations between potential cyber threats. • Document findings from threat detection activities, incident investigations, and threat actor monitoring, ensuring all information is recorded accurately for future analysis. • Assist in the development of security awareness programs to educate employees on emerging threats and how to recognize and respond to them. • Continuously gather, analyze, and share intelligence on current and emerging threats from various sources, including open-source intelligence (OSINT), dark web monitoring, threat feeds, and industry-specific information sharing groups. • Support red team exercises by providing threat intelligence insights that simulate real-world adversary behaviors. • Collaborate with IT and DevOps teams to ensure that threat intelligence informs the secure development and deployment of applications and systems. • Monitor for indicators of advanced persistent threats (APTs) within the organization's network, identifying long-term, stealthy threats that may be targeting sensitive data or intellectual property.

Requirements

• 3+ years of experience in cybersecurity, with a focus on threat intelligence, threat hunting, or incident response. • Excellent analytical and problem-solving skills, with the ability to think critically and connect the dots between seemingly unrelated events. • Strong communication skills, with the ability to document findings clearly and provide actionable recommendations. • Ability to work independently and collaboratively within a fast-paced, dynamic environment. • Strong understanding of threat intelligence methodologies, threat actor TTPs, and threat hunting techniques. • Familiarity with data analysis tools, behavioral analysis techniques, and security information and event management (SIEM) systems. • Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field. A Master’s degree is preferred. • Relevant certifications such as Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), or Certified Information Systems Security Professional (CISSP) are highly desirable.

Benefits

• Ability to work remotely • Excellent health benefits that begin on your first day of employment • $100 monthly fitness allotment, a tuition reimbursement program, and enhanced mental health resources • 401(k) plan with generous company match, and annual profit sharing contribution (subject to company performance) • PTO, Floating Holidays, Wellness Day Off, Birthday Day Off, and more!

Apply Now

Similar Jobs

September 20

HackerOne

201 - 500

HackerOne seeks a Security Analyst to evaluate vulnerabilities in bug bounty programs.

September 19

HackerOne

201 - 500

Security Analyst at HackerOne evaluates vulnerabilities and collaborates with hackers.

August 30

Cohere Health

201 - 500

Security Analyst to enhance cybersecurity at Cohere Health using advanced tools.

Built by Lior Neu-ner. I'd love to hear your feedback — Get in touch via DM or lior@remoterocketship.com

Join our Facebook group

👉 Remote Jobs Network