Sr. Cyber Threat Intelligence Analyst Job at cFocus Software Incorporated, Washington DC

YmpDRmw3b29nOXJpZERIakNYbElCaVBZZ1E9PQ==
  • cFocus Software Incorporated
  • Washington DC

Job Description

cFocus Software seeks a Senior Cyber Threat Intelligence Analyst to join our program supporting AOUSC. This position is fully remote. This position requires active Public Trust clearance.

Qualifications:
  • 8 years’ experience in conducting in-depth analysis of cyber threats, including malware, phishing campaigns, and other attack vectors. This involves identifying patterns, trends, and indicators of compromise (IOCs) to understand threat actor tactics, techniques, and procedures (TTPs).
  • 8 years’ experience in collecting and aggregating threat intelligence from various sources, such as opensource intelligence (OSINT), dark web forums, and commercial threat intelligence feeds. This includes evaluating the credibility and relevance of intelligence sources and identifying actionable intelligence for the organization.
  • 8 years’ experience in producing high-quality written and oral reports, briefings, and presentations to communicate threat intelligence findings, assessments, and recommendations to stakeholders at all levels of the organization.
  • 5 years working in an office environment with technical IT personnel.
  • 5 years of experience with Microsoft Office Tools such as Word, PowerPoint, Excel, and OneNote
  • 5 years of experience using cybersecurity tools and technologies for threat intelligence analysis, such as threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and malware analysis tools.
  • Bachelor’s degree in Cybersecurity preferred
  • Security + is required and Network + or equivalent is preferred

Duties:

 
  • Identify emerging cyber threats, vulnerabilities, and attack trends based on information from various sources, including open-source research, dark web forums, and threat intelligence feeds.
  • Conduct in-depth analysis of cyber threat intelligence data to identify patterns, trends, and indicators of compromise (IOCs) associated with potential cyber-attacks. This includes analyzing malware samples, phishing emails, and other threat artifacts to understand threat actor TTPs.
  • Produce high-quality written and oral reports, briefings, and presentations to communicate cyber threat intelligence findings, assessments, and recommendations to senior leadership, stakeholders, and technical teams in a clear and actionable manner.
  • Proactively search for signs of malicious activity within the organization's network and systems utilizing threat intelligence to identify and investigate potential security incidents or anomalies.
  • Enhance the organization's cyber threat intelligence capabilities and methodologies in accordance with the latest cybersecurity threats, trends, and technologies.
  • Contribute to the development of cybersecurity strategies, policies, and procedures based on threat intelligence insights and analysis, helping to prioritize security investments and initiatives to mitigate emerging threats effectively.
  • Provide mentorship, guidance, and training to other contractor’s employees, including sharing knowledge and best practices to build a skilled and cohesive cyber threat intelligence team.
  • Participate in information sharing initiatives and collaborate with industry peers, government agencies, and cybersecurity communities to exchange threat intelligence and enhance collective cyber defense capabilities.
  • Collaborate with vulnerability management teams to prioritize and assess the severity of vulnerabilities based on threat intelligence data, enabling informed decisions on patching and remediation efforts.
  • Provide written recommendations on Government drafts of executive summaries and briefings.
  • Provide recommendations and input on other content and presentations.
  • Incorporate data from Mandiant, federal partners, and other vendors to expand threat awareness and bolster proactive defense strategies.
  • Examine malware samples from diverse sources using reverse engineering techniques to uncover capabilities, origins, and threat actor methodologies.
  • Detect and study emerging vulnerabilities, attack trends, and threat patterns through internal data, open-source intelligence, and integrated feeds from trusted platforms.
  • Use Splunk and other tools to identify unusual activities, create actionable alerts, and monitor potential security incidents in real time.

Job Tags

Full time, For contractors, Remote job,

Similar Jobs

Select Staffing

Mail Clerk Job at Select Staffing

DescriptionWe are seeking a reliable and detail-oriented Mail Clerk to join our team in Agoura Hills. This individual will play a key role in ensuring that all incoming and outgoing mail is processed accurately, efficiently, and in compliance with firm procedures. This... 

Amazon

Staff Pharmacist, Amazon Pharmacy Job at Amazon

 ...that embody our mission and position ourselves in becoming the world's safest and fastest online pharmacy.We are looking for a Pharmacist to join us on our journey to make it drastically easier for customers to find, choose, afford, and engage with the services, products... 

Sidney Health Center

Registered Nurse ~ ENT Clinic Job at Sidney Health Center

Text to apply: (***) ***-**** using the code: ENT

Tutor Me Education

Special Education Aide Job at Tutor Me Education

 ...Technology : Use and teach tools like speech-to-text software or specialized apps. Social and Emotional Support : Build confidence,...  ...and Adaptability : Adjust lessons based on the students needs and energy levels. Advocacy : Help students understand and... 

CDN Logistics, Inc.

Class A Company Driver Job at CDN Logistics, Inc.

 ...CDN Logistics is a Veteran-Owned 53ft dry van company based out of Northlake, IL. We are currently hiring OTR Solo Company Drivers to join our fleet. Reach out to RECRUITING @ (***) ***-**** option 1. Company Driver Qualifications: Must have a valid Class A CDL...