Cyber Threat Intelligence Analyst Resume Samples

4.9 (76 votes) for Cyber Threat Intelligence Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the cyber threat intelligence analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
EM
E McGlynn
Emmitt
McGlynn
95704 Vickie Island
San Francisco
CA
+1 (555) 320 3955
95704 Vickie Island
San Francisco
CA
Phone
p +1 (555) 320 3955
Experience Experience
New York, NY
Cyber Threat Intelligence Analyst
New York, NY
Lockman Inc
New York, NY
Cyber Threat Intelligence Analyst
  • Work in coordination with managers and colleagues towards delivery of an automated IRAM Fusion platform for data ingestion, processing, analytics and knowledge management
  • Drive support for the Threat Management Center during incident response and threat monitoring activities to include intelligence context and analysis support, provide industry expertise and recommend relevant remediation and countermeasures
  • Conduct pivoting analysis on Threat Intelligence to identify current impact or proactively process mitigations for defense through security technologies and proactive mitigations including zero-day patching identification, anomalous behavior, and recommendations of remediation action
  • Process both internal and external Cyber Threat Intel for determination of potential threat and impact, hunting to determine potential scope, and implementation of mitigations to defend Verizon’s enterprise; this includes reports from law enforcement, security researchers, industry leaders and governmental agencies
  • Processes both internal and external Cyber Threat Intelligence for determination of impact, hunting to determine scope, and implementation of mitigations to defend Verizon’s enterprise
  • Be part of the CSIRT team providing support in responding to high severity security incidents
  • Knowledge of attack methods, network/endpoint forensic analysis, and malware analysis
New York, NY
Cyber Threat Intelligence Analyst, AVP
New York, NY
Carroll Group
New York, NY
Cyber Threat Intelligence Analyst, AVP
  • Great team player to work with colleagues and managers
  • Management Program; and the framework that defines the threat intelligence priorities
  • Working knowledge of FS-ISAC and similar open/commercial threat intelligence feeds
  • Proactively research relevant threats, provide intelligence briefings to stakeholders and produce reports and intelligence products
  • Perform cyber threat intelligence operations including intelligence collection (IOCs), tracking threat actors, identifying and tracking malicious infrastructure
  • Support prototyping and continuous development/integration of tools to store, exchange, and analyse threat and incident data
  • A creative and innovative approach to work
present
Boston, MA
Senior Cyber Threat Intelligence Analyst
Boston, MA
Cummings, Nitzsche and Tromp
present
Boston, MA
Senior Cyber Threat Intelligence Analyst
present
  • Identify, develop, manage and productively leverage external relationships to enhance intelligence collection efforts
  • Develops models for identifying incident-type activity, of malware or bad actors, using statistical analysis
  • Regularly develop and produce written intelligence reports, constructed from technical analysis and collected threat information for JPMC internal consumers
  • Provide regular written and verbal briefings and presentations for Global Cybersecurity partners and Lines of Businesses up to the senior executive level
  • Track potential threats associated with attempted intrusions, network & host-based attacks, and coordinate incident response efforts with cybersecurity teams
  • Explores patterns in network and system activity through log correlation using Splunk and other tools
  • Develop and maintain relationships with a wide range of internal stakeholders and external partners, officials and peers
Education Education
Bachelor’s Degree in International Relations
Bachelor’s Degree in International Relations
University of California, Santa Barbara
Bachelor’s Degree in International Relations
Skills Skills
  • Excellent ability at building relationships with other organizational groups
  • Strong knowledge of Cyber Threat Intelligence principles to include indicators of compromise (IOC) types, indicator pivoting and indicator attribution strength
  • Maintains knowledge of common email threats to quickly identify and differentiate between spam, cybercrime, and potential cyber espionage
  • Good knowledge of Information Systems
  • Strong knowledge of Cyber Threat Intelligence principles to include indicators of compromise (IOC) types; indicator pivoting and indicator attribution strength
  • Working knowledge of IS programs including, Incident Management, Vulnerability Assessment, Cyber Intelligence, Infrastructure Defence, Security Operations
  • Possesses the ability to review information to determine its significance, validate its accuracy and assess its reliability
  • Proven excellent writing skills
  • Excellent analytical and problem solving skills
  • 5 years professional experience working in Information Security in a computer/network/security analyst role monitoring systems
Create a Resume in Minutes

15 Cyber Threat Intelligence Analyst resume templates

1

VP, Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Primary GIA subject matter expert collocated with Cyber Intelligence Center Analysts, Cyber Incident Response Teams (CIRT) and other Citi units
  • Monitor open source message traffic, malware traffic, investigations, and cyber intelligence for threat intelligence equities
  • Supports development of strategic intelligence products/briefings analyzing cyber threats and tactics, nation/state actors, major cyber threat (criminal/ ideological) networks and developments in the policy realm internationally
  • Builds connectivity to other Citi units responsible for cyber related operations, monitoring, crisis management and response
  • Liaison with a broad network of public/private sector partners on cyber threat issues and identify industry trends and threats
  • Utilize and incorporate intelligence reporting from all available sources (all-source) including open source materials, liaison with government agencies, private sector counterparts, vendor reports/alerts, deep dive Internet research, geographic information systems (GIS) and commercial databases
  • Display critical thinking in the creation of succinct narrative reports, presentations, visual mapping and link charts or similar diagrams to report analytical assessments. Display data and the results of analysis in clear straightforward presentations that can be understood by clients. Provide written explanations of approach and analysis in plain language that supports the conclusions and observations
  • Demonstrate ability to identify and anticipate the problems and product/solution needs of our clients. Be well versed in conducting forecasting and ‘over the horizon’ threat analysis
  • Minimum of five (5) years of analytical experience in the cyber threat domain, intelligence analysis (private or government), statistical analysis, law enforcement or relevant experience in large, complex environments. Previous experience with financial services companies is preferred
  • Minimum of two (2) years of experience working in a cyber threat related position or information technology role
  • Minimum of 2-3 years of experience with intelligence databases and visualization software applications software packages such as Link Explorer, i2, Palantir, ESRI etc
  • Minimum of two (two) years of computer programing, scripting, and or data parsing
  • Established project management skills and experience. Ability to coordinate several projects simultaneously and executes daily duties with minimal supervision
  • Self-motivated with the ability and maturity to make decisions in the absence of detailed instructions
  • Minimum BA, graduate degree preferred in computer science or computer security related areas
  • Demonstrate knowledge of the TCP/IP OSI Model and fundamental of the Security Tirade “CIA”
  • Brings a professional network of industry and law enforcement relationships
  • Excellent communication, negotiation and presentation skills. Ability to effectively communicate, both orally and in writing, through all levels of the organization
2

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Work in coordination with managers and colleagues towards delivery of an automated IRAM Fusion platform for data ingestion, processing, analytics and knowledge management
  • By way of coaching and mentoring, share technical knowledge and analytical skills to develop and mature the teams’ technical analytical capability and output,
  • Enhance team analysis and output regarding new and emerging threat vectors and threat campaigns, including mapping external threats to the Barclays attack surface as relevant
  • Receive and take action on a diverse range of technical and threat information, conduct deep-dive analysis to draw out trend analysis and context, drawing relevant conclusions and assessment. Conduct and communicate analysis into cyber threat campaigns, threat actors and threat evolution, placing into context the resulting current and future threat to Barclays
  • Develop and maintain relationships with a wide range of internal stakeholders and external partners, officials and peers. Represent Barclays as part of trusted forums and official information exchanges. Deputise for Head of Cyber Threat Intelligence at external meetings attended by senior representatives from the finance, cross sector and government as required
3

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • 3 years of experience with all-source information analysis
  • Experience with collecting, analyzing, and interpreting qualitative and quantitative data from multiple sources for documenting results and analyzing findings to provide meaningful products
  • Ability to write high-quality intelligence assessments and briefings for a senior-level audience and provide a writing sample
  • Ability to develop specific expertise, discern patterns of complex threat actor behavior, and communicate and comprehend current and developing Cyber threats
  • Ability to leverage well-honed online researching expertise to identify and navigate relevant online forums, specialized Web sites, and social media, and traditional sources to support research and analysis
  • Ability to work in a fast-paced work environment, multi-task, and thrive with truncated delivery deadlines
  • Experience with emerging computer or online technologies, online social behaviors, and computer or Internet slang
  • Experience with a foreign language, including Arabic, Farsi, Mandarin, Russian, or Turkish
  • MA or MS degree in International Relations, Security Studies, Intelligence Studies, Political Science, Regional Studies, Cybersecurity, or International Law preferred
  • Network+, Security+, or CEH Certification
4

Senior Cyber Threat Intelligence Analyst Resume Examples & Samples

  • 5+ year's experience in a large, mission-critical environment
  • Experience in network intrusion methods and network forensics
  • Ability to apply a thorough knowledge of attacker capabilities, intentions, motives, and historical operations/targets to inform JPMC Cybersecurity strategies quickly, clearly and effectively
  • Directing resources through intelligence-based response process
  • Malware analysis, virus exploitation and mitigation techniques experience
  • Coding (scripting) experience e.g. Perl, VB Script, Python etc
  • Experience in partnering with major government agencies and authorities around the world
  • Experience with Lockheed Martin’s Cyber Kill ChainTM and Intelligence Driven Defense
5

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Proactively monitor and analyze the cyber threat landscape for existing and emerging threats
  • Assess applicability of threats to the bank's environment
  • Assess the likelihood and potential impact of the threat affecting the bank's environment
  • Perform detailed analysis of the threat including attackers capabilities, intentions, motives, tactics, techniques, tools and apply the knowledge to response activities
  • Develop internal threat intelligence by analyzing security incidents and events to build a detailed understanding of threats targeting the bank
  • Be part of the CSIRT team providing support in responding to high severity security incidents
  • Perform deep technical analysis of malware and tools used in attacks
  • Develop a detailed response plan to the applicable threats
  • Track and document threats and the assessment results
  • Play an active role in the internal threat intelligence community and provide valuable input into strategic threat intelligence and other intelligence functions
  • Establish and maintain relationships and trust with other security and technical teams, including IT risk, information security officers, Vulnerability Management as well as security variety of other stakeholders
  • Work on building, extending and continuously improving the operational threat intelligence capability
6

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Researches and analyzes cyber intelligence topics
  • Identifies risk to Citigroup associated with the intelligence topic
  • Analyzes and synthesizes data to identify patterns, commonalities, and linkages
  • Identifies and scrutinizes arguments and underlying rationale for their own analyses and analyses of junior analysts
  • Demonstrates expertise when applying appropriate structured analytic techniques to intelligence problems
  • Does not take information at face-value. Looks deeper by analyzing information for abnormalities, evaluating the source of the data, and cross-referencing other sources
  • Expertly uses Bottom Line Up Front (BLUF) format
  • Produces clear, concise, well thought-out, and defendable intelligence products
  • Consistently strives to increase the quality of his or her writing
  • Tailors products to intended customers
  • Produces analyses of complex topics that are technically correct but accessible to generalists
  • Plays an active role in the product review process, providing editing advice to other analysts
  • Bachelor’s degree in intelligence analysis or related field; Master’s degree preferred
  • 7+ years’ experience working in an intelligence analysis job function; cyber subject matter expertise preferred
  • Advanced intelligence analysis experience and skills
  • Familiarity with open source intelligence research and methodologies
  • Previous US Intelligence and/or Law Enforcement background(s) a plus
7

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Draft, edit, and review threat intelligence analysis from multiple sources
  • Develop intelligence on, characterize, and track threat actors’ activities, ranging from tactical level capabilities to global operations
  • Correlate collected intelligence, in order to build upon a larger knowledge base of tracked threat activity
  • Provide intelligence briefings / presentations
  • IOC collection and management
  • Experience in analyzing, gathering intelligence on, developing, and documenting threat group activities
  • Experience in analyzing malware / hacking tools and threat actor tactics, techniques, and procedures to characterize threat actors’ technical methods for accomplishing their missions
  • Demonstrated understanding of remediation and counter measures for challenging information security threats
  • Moderate to advanced technical experience in 2 or more of the following
  • Analysis of TCP/IP network communication protocols
  • Conducting forensic analysis on and data captures from networks / packet capture, hosts (volatile/live memory), electronic media, log data, and network devices in support of intrusion analysis or enterprise level information security operations
  • Familiarity with investigative tools and techniques such as host and network based analysis tools, forensic tools (Encase, FTK, Helix, Paraben, etc.), volatile memory analysis techniques
  • Multiple operating systems, such as Windows, Linux, and Mac/OSX
  • Knowledge of common security controls, detection capabilities, and other practices / solutions for securing digital environments, to include packet flows / TCP & UDP traffic, firewall and proxy technologies, anti-virus and other host-based monitoring, email monitoring and spam technologies, SIEMs, etc
  • Bachelor’s degree or equivalent working experience
  • 3-5+ years of experience in either
  • Network forensics analyst
  • Security engineer/ consultant
  • Investigative or Incident Response environments
  • A programming language: Python, Perl, or similar scripting language
  • Take on new responsibilities and influence others as needed to deliver consistent results
8

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Develop new sources of information and develop capabilities to collect and analyse information gathered
  • Provide analysis of cyber security threat areas
  • Expand and maintain an in-depth knowledge of threat vectors, threat actors and trends in the internal cyber intelligence platform
  • Keep up to date with security landscape, mitigation techniques and latest technologies and emerging threats through networking and events
  • Review reported leads for threat information and situational awareness to determine severity and escalation
9

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Tuning and enhancing SIEM alerts
  • Manage and ensure the effectiveness of security monitoring devices
  • Good social, communication, and technical and general writing skills
  • Deep understanding of IDS, Firewalls, network monitoring sensors
  • Deep understanding of security threats and vulnerabilities
  • Experience with Splunk Enterprise Security is a plus
10

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • The Intelligence Analyst will track and analyze emerging threats and contextualize threats specific to company assets and personnel. This may include social and political activism, crime, cyber threats and cultural and societal trends
  • Conducts intelligence analysis of external threats targeting the retail and banking industry as well as leverages internal data stores in order to gauge the potential impact on business operations
  • Assists in the production of finished intelligence products and threat models
  • Engages in intelligence collection in order to further refine the organization's understanding of the current threat environment
  • The successful candidate will work with internal and external corporate and government partners for the purpose of information collection, analysis and best practice benchmarking
  • Seek and identify new technology and applications to improve efficiency and effectiveness of the incident response team
  • Monitor diverse open sources to identify or verify threats or any security, social, political, economic or cultural factors that may create risk to the company
  • Create threat assessments based off of trends and incidents
  • Actively investigates the latest in security vulnerabilities, advisories, incidents, and penetration techniques and escalates when appropriate
  • Understands thoroughly the standards, concepts and principles of business analysis to solve practical needs of the business
  • Makes decisions that impact success of personal deliverables
  • Collaborates with peer institutions, law enforcement partners and ISAC membership
  • 1-2+ years of direct experience in information security threat intelligence operations supporting incident response
  • Ability write or present actionable intelligence derived from the raw information
  • Must be able to think outside the box and develop solutions to accomplish difficult tasks
  • Developed ability to prioritize daily tasks and operational demands
  • Assertive and proactive in identifying and resolving issues and concerns
  • Demonstrated ability to effectively summarize complex information and present in a concise and compelling manner
  • GIAC certifications are preferred but not required
11

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • As a member of the Cyber Threat Monitoring team, this candidate would be responsible for coordinating a continuous hunt across a global network leveraging enterprise wide capabilities to search for indicators of compromise
  • Additionally this candidate would enrich existing cyber intelligence by conducting analysis of malicious code (such as binaries, weaponized PDFs, etc.), malicious emails, and performing open source intelligence analysis
  • Additionally, the candidate will perform cyber threat intelligence review, assessing and tracking potential cyber threats commonly associated with attempted intrusions, network & host-based attacks (external & internal), product vulnerabilities, etc., and coordinate incident response and remediation efforts
  • Candidate is expected to participate in a 24x7 off hours support rotation
  • Bachelor's Degree or a combination of education plus equivalent work experience 5 years or more experience in a corporate IT environment in addition to a degree with direct background or exposure to cyber security Strong analytical and problem solving skills
  • Hands-on experience with network traffic analysis tools (e.g., tcpdump, Wireshark)
  • Experience leveraging at least one enterprise SIEM platform
  • Strong understanding of malware attack vectors and phishing methods. * Strong understanding of APT attacks and methods
  • Knowledge and understanding of static and dynamic malware analysis reverse engineering knowledge
  • Knowledge and understanding of sandboxing for malware analysis
  • Usage of open source intelligence to analyze filies/URLs/IPs
  • Basic knowledge and understanding of Netflows
  • Knowledge and understanding of security tools: Firewalls, Web Filter, Email Filter, IDS/IPS, etc
  • Demonstrated capability to work with little management oversight and must have strong personal initiative
  • Strong knowledge of Microsoft Windows platform as it pertains to forensic investigation: EventLogs, Windows Registry, Prefetch, Volume shadow copy, etc
  • Experience with linux/unix systems and basic scripting preferred
  • Knowledge of network forensics, network traffic analysis, and Pcap analysis
  • Information Security certifications preferred: CISSP, GIAC/SANS certifications
  • Ability to pick new technology or concepts up very quickly
12

Cyber Threat Intelligence Analyst, Mid Resume Examples & Samples

  • 4+ years of experience in a professional work environment, including all-source intelligence
  • HS Diploma or GED
  • CISSP, Security+, Network+, or Certified Ethical Hacking Certification preferred
13

Cyber Threat Intelligence Analyst, Senior Resume Examples & Samples

  • Experience with performing intelligence collection and analysis
  • Experience with performing Cyber threat analysis
  • Experience with malware analysis and forensic investigation and analysis
  • Experience with security problem management, security information and event management, or Cyber incident management
  • Experience with ArcSight SIEM, Splunk, RSA Netwitness, FireEye, Sourcefire Snort, Bro IDS, Fidelis XPS, and HB Gary Active Defense technologies
14

All Source Cyber Threat Intelligence Analyst Resume Examples & Samples

  • 4+ years of experience as an intelligence analyst supporting the DoD or intelligence community
  • 3+ years of experience with using SIPRNet, JWICS, and client network intelligence reporting repositories
  • 2+ years of experience with using Microsoft Office suite
  • 2+ years of experience with conducting research and analysis
  • 2+ years of experience with providing briefings, training presentations, or communication to groups of individuals
  • Experience with serving as a primary author of analytical reports
  • Experience with Air Force programs, weapon systems and technologies, DoD processes, Army, Navy and Joint Command Programs, and weapon system development programs
  • Experience with using data discovery tools, including constructing search strings and queries
  • Experience with Cyber-attack vectors and Cyber threat actors recognized by the DoD
15

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • BA/BS degree in Information Technology or Information Security; Computer Science; Intelligence Studies; Cyber Security or another related field of study or equivalent 3+ years performing technical cyber threat intelligence analysis
  • Strong technical skills proficiency in the following areas: network communication using TCP/IP protocols; basic system administration; basic understanding of malware (malware communication; installation; malware types); intermediate knowledge of computer network defense operations (proxy; firewall; IDS/IPS; router/switch) and open source information collection. Candidate must have a thorough understanding of Domain Name Service records
  • Strong knowledge of Cyber Threat Intelligence principles to include indicators of compromise (IOC) types; indicator pivoting and indicator attribution strength
  • Strong proficiency and recent experience (last 3 years) performing NETFLOW and PCAP analysis using common analysis tools (Wireshark; Splunk; ChopShop; Dshell; Network Miner; Moloch; etc). Candidate must be strongly proficient at sessionizing PCAP data; identifying and decoding protocols; extracting files; and applying standard filters such as Berkley Packet Filter (BPF)
  • Strong or Intermediate ability to apply formal intelligence analysis methods; develop hypothesis; prove/disprove relationships; always ask why; defend your analysis; and apply attribution to cyber threat activity. Candidate must be able to make confidence-based assessments for purposes of attribution based on their technical analysis of network traffic; multi-source data; malware and system forensic analysis. Candidate must be able to identify analytic bias
  • Intermediate ability to build intrusion related data visualizations and perform analysis (i.e.; using I2 Analyst Notebook; Netviz; Palantir; etc)
  • Intermediate ability to present technical information and analysis to groups up to 50 persons on a quarterly basis. Candidate will be required to brief smaller groups up to 10 persons on a weekly basis
  • Chinese Mandarin language; ILR 3/3 level of general proficiency (or equivalent certified language training standard) with a test date in the last 3 years
  • Formal training as an intelligence analyst in any discipline � graduate of US Govt intelligence analysis course: CAC; IBC; Kent School; IC 101; Analysis 101; Army; Navy; Air Force; etc
  • Experience applying Kill Chain analysis; Cyber Intelligence Preparation of the Environment (CIPE) modeling; or Diamond modeling of cyber threat activity
  • Certifications (any): CISSP; CEH; Security+; SANS certification(s); Network+; CCNA
  • Technical Skills proficiency: Python language; encryption technologies/standards
  • Experience using COTS/Open Source tools: Novetta Cyber Analytics; Mitre ChopShop and/or ARL DSHELL
  • Analyst experience in Federal Cyber Center; NSA; or Corporate CIRT
  • 10-15 years of related experience supporting intelligence operations
16

Senior Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Provides insights to other team members on nuances of networking technologies, architectures, and network traffic analysis to support other analysts who do not have networking experience
  • Develops models for identifying incident-type activity, of malware or bad actors, using statistical analysis
  • Investigates evidence of threats against Windows, Linux, Database, Applications, web servers, firewalls or other relevant technologies
  • Tests models by injecting indicators
  • Guide junior threat analysts
  • Support shift work (1st, 2nd, or 3rd shift) as assigned
  • 5+ years of networking experience, with routing, switching, and packet capture and analysis experience
  • Interest in learning about Windows, Linux, Database, Application, Web server, firewall, SIEM etc. log analysis
  • Digital analysis and forensics experience using Encase, Palantir, i2 Analyst’s Notebook, FTK or similar tools or extensive statistical analysis tool experience (including extensive use of MS Excel)
  • Familiarity with common network vulnerability/penetration testing
  • Experience with testing automation suites such as Selenium
  • Experience evaluating systems and network devices and enterprise networks for IA vulnerabilities
  • Experience on an Incident Response team performing Tier I/II initial incident triage
17

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • 6 or more years experience in the Information Security field
  • 4 or more years directly related to the area of cyber threat intelligence, incident response or malware research
  • Experience developing and providing effective and professional presentations to all levels (including Senior Leadership)
  • Excellent customer service skills and problem resolution
  • Experience in being able to manage and prioritize multiple tasks in an effective manner
  • Ability to work independently without daily direction
  • Candidate must currently hold or meet the requirements to obtain a US Government SECRET security clearance
  • Strong understanding of mitigating security controls (i.e., anti-virus, IPS/IDS, email filtering, web site blocking, patching) and how they work in an overall defense in depth risk assessment methodology
  • Understanding of network infrastructure (including firewalls), web proxy and/or email architecture - particularly as they apply in a mitigating control functionality
  • Understanding of social networking programs (i.e., Facebook, Twitter, LinkedIn) - particularly as they apply to security risks and threats
  • Understanding of back-channels typically used by actors for malicious activity (such as IRC)
  • Understanding of obfuscation techniques and best practices for ensuring device non-attribution
  • Understanding of vulnerability scanning and reporting
  • Understanding of security event and incident handling
  • Understanding of ethical hacking tools and techniques
  • Understanding of OS and application hardening best practices
  • Understanding of one or more Technology Platforms (Windows, Open Source, Middleware Applications, Database Applications, Adobe) - specifically as they apply to successful security control mitigation and particularly to vulnerability management
  • Understanding of malware reverse-engineering techniques
  • Understanding of distributed denial of service attack intelligence gathering, concepts, mitigation tools and techniques
  • Understanding of mobility security device and application risk and threat assessment
  • Understanding of nation and non-nation state actors, hactivist groups, advanced threats and the “kill chain”methodology
  • Working knowledge of Microsoft Sharepoint web application practical application and functionality
18

Senior Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Regularly produce Threat Intelligence Reports, providing detailed analysis on cyber events, including relevant political, economic and geopolitical variables. Provide a forward-looking view of the threat, predicting shifts in adversarial intent, goals and strategic objectives
  • Act as a subject matter expert for an allocated geographic and/or thematic area, closely following open source and closed intelligence source reporting on associated actor groups (nation-state, criminal, hacktivist and terrorist), incidents and campaigns
  • Maintain detailed threat actor profiles on adversaries of interest/relevance to the firm, covering tactics, techniques and procedures, intent, goals and strategic objectives
  • Identify, develop, manage and productively leverage external relationships to enhance intelligence collection efforts
  • Provide regular written and verbal briefings and presentations for Global Cybersecurity partners and Lines of Businesses up to the senior executive level
  • 6+ years in an intelligence analyst role and 3+ years in a cyber-role, with a track record of actively countering existing and future threats
  • Specialist training or skills in one or more of the following
  • 3+ years Intelligence Community experience and/or 3+ years’ experience at an international institution conducting cyber or security/intelligence related work
  • Understanding of the role of government and non-government entities involved in cyber security
  • Working knowledge of global threats to international cyber security, and conversant in the tactics, techniques and procedures used by cyber adversaries
  • Professional working proficiency in one or more of the following languages: Russian, Mandarin
  • Advanced degree or proficiency in international relations, economics, politics, or related field or equivalent experience, particularly in Asia
  • Financial sector experience
  • Highly proficient in i2 / Maltego / link analysis
19

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Active TS//SCI (not waiverable)
  • Minimum 3 years’ experience as an Intelligence Analyst, including a familiarity with DNI analytic production standards
  • Must have completed one of the following courses: Intro to Networks and Computer Hardware (INCH), Intro to Cyberthreat Analysis Course (ICAC), Counterintelligence Analytic Methods Course (CAMC)
  • Strong knowledge of/experience with MS Office, particularly Word, Excel, and PowerPoint
  • No remote delivery; must work on-site at Fort Meade, MD
  • Some local travel required (<5%)
  • Experience with network analysis and common components of IT architecture
  • Background in Counterintelligence and/or Human Intelligence
  • Experience with the US military and/or the Department of Defense
20

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • 5 years of experience with the intelligence community
  • 3 years of experience as an intelligence analyst, including DNI analytic production standards
  • Completed Intro to Networks and Computer Hardware (INCH), Intro to Cyber Threat Analysis Course (ICAC), or Counterintelligence Analytic Methods Course (CAMC)
  • Experience with Counterintelligence or Human Intelligence
  • Experience with the US military or the DoD
21

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • 4+ years of experience with Cyber intelligence analysis
  • Experience with information security devices, including firewalls and intrusion detection and prevention systems, and applications, including security information management tools, such as NetForensics and ArcSight
  • Experience with the capabilities and techniques of hacker and hacktivist groups, criminal syndicates, and advanced persistent threats conducting computer network exploitation and attacks against the US government resources and critical infrastructure
  • Experience with signatures, tactics, techniques, and procedures associated with preparation for and execution and implementation of such attacks
  • Experience with intelligence briefings
  • Experience with threat analysis
  • Experience with intelligence products
  • Experience with early indications and warnings
  • Experience with Open Source intelligence techniques
  • Experience with working in a network security incident response team, including a Security Operations Center (SOC), Computer Emergency Response Team (CERT), Computer Incident Response Team (CIRT), Computer Incident Response Center (CIRC), or Cyber Security Incident Response Center (CSIRC)
22

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Prepares assessments of current threats and trends based on the sophisticated collection, research and analysis of classified and open source information
  • Develops and maintains analytical procedures to meet changing requirements and ensure maximum operational success
  • Provides guidance and work leadership to less-experienced staff, and may have supervisory responsibilities
  • Strong technical skills proficiency in the following areas: network communication using TCP/IP protocols, basic system administration, basic understanding of malware (malware communication, installation, malware types), intermediate knowledge of computer network defense operations (proxy, firewall, IDS/IPS, router/switch) and open source information collection. Candidate must have a thorough understanding of Domain Name Service records
  • Strong knowledge of Cyber Threat Intelligence principles to include indicators of compromise (IOC) types, indicator pivoting and indicator attribution strength
  • Intermediate ability to build intrusion related data visualizations and perform analysis (i.e., using I2 Analyst Notebook, Netviz, Palantir, etc)
  • Formal training as an intelligence analyst in any discipline – graduate of US Govt intelligence analysis course: CAC, IBC, Kent School, IC 101, Analysis 101, Army, Navy, Air Force, etc
23

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Experience building personal development products within the LE/CI or Intelligence Community
  • Formal training as an intelligence analyst in any discipline – graduate of USG intelligence analysis course: CAC, IBC, Kent School, IC 101, Analysis 101, Army, Navy, Air Force, etc
  • Formal Law Enforcement/Counterintelligence training: i.e., FLETC, JCITA, etc
  • Technical Skills proficiency: encryption technologies/standards
  • Experience using GOTS, COTS/Open Source tools: i.e., NOEISIS, Novetta Cyber Analytics, Mitre ChopShop and/or ARL DSHELL
  • Analyst experience in Federal Cyber Center or Corporate CIRT
24

Cyber Threat Intelligence Analyst, Mid Resume Examples & Samples

  • 3+ years of experience in intelligence collection, exploitation, or analysis
  • Experience in the intelligence analysis of Cyberspace operations
  • Ability to perform shift work
  • BA or BS degree required or 4 years of military experience
  • 2+ years of experience in intelligence analysis of Cyberspace operations
25

Cyber Threat Intelligence Analyst, Senior Resume Examples & Samples

  • 6+ years of experience with network architecture concepts, common ports and protocols, and network monitoring tools
  • Experience with Microsoft Office, including Word, Excel, and Outlook
  • Knowledge of Cisco network devices, including the IOS command line
  • BA or BS degree or 13 years of experience as a network operations specialist
  • Experience with working in a Network Threat Operations Center (NTOC)
  • Experience with Microsoft OS, Server OS, Cisco, Solaris OS, and Wireshark
  • CISSP and CEH Certification
26

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Reviews incident logs/records mining for patterns
  • Explores patterns in network and system activity through log correlation using Splunk and other tools
  • Share IOC models with trusted parties for validation and collaboration
  • 6+ years of relevant work experience for an E03
  • 8+ years of relevant work experience for an E04
  • Experience in analysis in investigations, such as in IT, law enforcement, military intelligence, or business analytics
  • Verbal/written communication and interpersonal skills to effectively communicate with team-members
  • Must be highly motivated with the ability to self-start, prioritize, multi-task and work in a team setting
27

DIB Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Prepare assessments of current threats and trends based on the sophisticated collection, research and analysis of classified and open source information
  • Develop and maintain analytical procedures to meet changing requirements and ensure maximum operational success
  • Collect data using a combination of standard intelligence methods and business processes
  • Maintain current knowledge of relevant technologies and subject areas
  • Participate in special projects as required
  • Performs forensic analysis of digital information and gathers and handles evidence
  • Identifies network computer intrusion evidence and perpetrators
  • Investigates computer fraud or other electronic crimes, crack files and system passwords, detects steganography and recovers deleted, fragmented and corrupted data from digital media of all types
  • Ensures chain of custody and control procedures, documents procedures and findings in a manner suitable for courtroom presentation and prepares comprehensive written notes and reports
  • May be required to testify in court as expert witnesses
  • Must hold a DoD Top Secret security clearance with eligibility for SCI
  • Bachelor's degree (computer science or related field preferred) or equivalent combination of education and experience
  • Five or more years of experience in computer network operations or supporting the intelligence or law enforcement communities
  • Strong proficiency and recent experience (within last 3 years) performing NETFLOW and PCAP analysis using common analysis tools (examples include Wireshark, Splunk, ChopShop, Dshell, Network Miner, Moloch, etc). Candidate must be strongly proficient at sessionizing PCAP data, identifying and decoding protocols, extracting files, and applying standard filters such as Berkley Packet Filter (BPF)
  • Strong proficiency Report writing - a technical writing sample and technical editing test will be required if the candidate has no prior published intelligence analysis reporting
  • Strong presentation skills to train and educate employees on technical material and applications
  • Strong organization and time-management skills
  • Ability to prioritize and meet deadlines
28

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Must hold a DoD Top Secret security clearance with eligibility for SCI and pass a CI Scope Polygraph
  • BS or equivalent + 14 yrs related experience, or MS + 12 yrs related experience
  • Experience working with systems infrastructure including hardware configuration, operating system and networks
  • Chinese Mandarin, Farsi, Arabic, Russian, or Korean language, ILR 3/3 level of general proficiency (or equivalent certified language training standard) with a test date in the last 3 years desired
  • Strong interpersonal skills for interacting with employees at all levels of the organization
  • Strong comprehension skills for understanding products and applying knowledge to presentations
  • Ability to maintain high level of confidentiality regarding employee information
29

SSD Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Operate the Strategic Cyber Threat Intelligence Cycle: collection, analysis, dissemination and mitigation efforts relating to priority threats targeting the Company’s technology infrastructure, intellectual property, and other sensitive information
  • Provide tactical and operational analysis in support of complex investigations
  • Collaborate with Information Technology’s Cyber Threat Intelligence Team within the Security Operations Center
  • Provide secondary analysis of intelligence from 3rd party intelligence feeds
  • Integrate cyber intelligence into physical security and traditional threat analysis and investigations
  • Prepare briefs for senior leaders across the Company’s business functions on risk and mitigation strategy
  • Produce intelligence products designed to enable the senior leadership decision making process
  • Minimum five years of experience working in federal law enforcement, civilian or military intelligence agency with experience in providing analytical support in complex cyber investigations
  • Knowledge of the intelligence cycle from threat prioritization and collection management, through analysis and dissemination
  • Understanding of how cyber threats intersect with traditional threats
  • Strong communication, presentation and writing skills
  • Ability to develop and present technically complex matters in non-technical terms
  • Ability to work in a team environment and deliver consistent results with limited resources
  • Experience in information security threat, vulnerability and risk assessments
  • Knowledge of information technology including network, workstation, mobile, cloud and application security
  • Four year college degree
  • Preferred professional certifications, CISSP
  • United States Government security clearance or ability to successfully obtain
30

Cyber Threat Intelligence Analyst Senior Resume Examples & Samples

  • 2+ years experience with advanced features of Microsoft Office Suite
  • Knowledge of User Behavior Analysis
  • Knowledge of honey pots/tokens/traps
  • Experience communicating to executive audience and breaking down information for easy consumption
  • Willingness to acquire in-depth knowledge of network- and host security technologies and products (such as firewalls, network IDS, scanners) and continuously improve these skills
  • Demonstrated ability to work in a team environment, able to train and coach other team members
  • Extensive experience in topic research and data analytics
  • Ability to read an understand packet captures from a security perspective
  • General technical skills, includes TCP/IP knowledge, networking and security product experience
  • Able to take ownership of tasking and tactically/operationally drive towards it
  • 5+ years of information security related experience, in areas such as
31

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Coordinates with business units and provide concrete recommendations for mitigating sophisticated cyber threats
  • Possesses previous experience as a cyber-threat intelligence analyst and demonstrates the competencies associated with a mid-level cyber threat analyst
  • Provides in-depth analysis of suspicious emails identified and reported by Chevron end users
  • Maintains knowledge of common email threats to quickly identify and differentiate between spam, cybercrime, and potential cyber espionage
  • Communicates findings in written and oral formats to assist in the protection of the Chevron network
  • Develops, crafts, and presents threat intelligence reporting, briefings, and other cyber threat intelligence communications providing analysis of cyber threat patterns and trends relevant to Chevron
  • Collaborates with technical analysts to provide indications and warnings and conduct predictive analysis of potential malicious activity
  • Coordinates with all aspects of the Cyber Intelligence Center (CIC) as appropriate
  • Develops, crafts, and presents timely, relevant, and accurate analytical cyber threat intelligence products detailing specific cyber threats to Chevron’s global information infrastructure
  • Stays abreast of world-wide events that are indicators of developing trends to maintain situational awareness
  • Bachelor's Degree in Cyber Security, Computer Science, Engineering, Cyber Security or related studies. Four years of direct experience in a related field can be substituted for a degree
  • Substantive technical knowledge of fundamental information technology security principles
  • Operational understanding of TCP/IP and computer networking and knowledge of the functions of security technologies
  • Ability to identify cyber threat-related trends in adversary tactics, techniques, and procedures, targeting, malware development and implementation, and capabilities and the ability to triage information and identify actual threats in a volume of information such as email
  • Able to identify and assess threats against Chevron’s information technology infrastructure and provide proactive recommendations to business units to mitigate identified threats
  • Subject matter expertise in one or more of the following cyber threat topics: cyber espionage, cybercrime, hacktivism, social engineering, malware, and other emerging cyber threats
  • Proactively researches emerging cyber threats to maintain subject matter expertise and situational awareness of the global cyber threat environment
  • Experience preparing, presenting, and defending analytical findings through the development of a range of written and oral products such as reports and briefings
  • Adept at communicating with contacts in a range of roles from C-level executives to technical engineers and analysts
  • Experience working with the Microsoft Office Suite to include Microsoft PowerPoint, Microsoft Word, Microsoft Excel, and Microsoft Outlook
  • Experience working as part of a team in a high-tempo work environment
  • Familiarity with cybersecurity concerns facing large enterprises and government agencies
  • Experience with intelligence analysis tools and methods
  • Experience using Analyst Notebook, Palantir, Maltego or other similar data analysis/intelligence analysis tools
  • Experience performing open source research, all source intelligence analysis, and distilling raw information into actionable intelligence
  • Experience conducting link, trend and temporal analysis
  • Previous experience as a cyber threat analyst
  • Knowledge of various malware families/campaigns and various cybercrime methods will be beneficial but not required
  • Direct work experience in security monitoring or incident response or related security or technology field
  • Ability to understand substantive, demonstrable technical information about fundamental information technology security principles
  • Subject matter expertise in understanding various malware families/campaigns and various cybercrime methods will be beneficial but not required
32

Senior Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Lead deep-dive intelligence analysis of suspicious activity and attempted attacks
  • Produce Threat Intelligence Reports, providing detailed analysis on cyber events, including relevant political, economic and geopolitical variables. Provide a forward-looking view of the threat, predicting shifts in adversarial intent, goals and strategic objectives
  • Track potential threats associated with attempted intrusions, network & host-based attacks, and coordinate incident response efforts with cybersecurity teams
  • Contribute the cybersecurity perspective to discussions and decisions regarding JPMC global technology infrastructure and technology deployments
  • 3+ years in an intelligence analyst role and 3+ years in a cyber-role
  • Strong knowledge or experience in one or more of the following
  • Investment banking
  • Consumer and/or Commercial banking
  • Open Source Intelligence (OSINT) gathering and/or analysis
  • Social Media Intelligence (SMI/SOCMINT) gathering and/or analysis
  • Human Intelligence (HUMINT) analysis
  • Signals Intelligence (SIGINT) analysis
  • Subject matter expert in one or more of the following areas: regional geographic expertise, thematic (e.g. criminal groups) expertise, corporate intelligence, banking/finance
  • Significant and detailed threat actor knowledge
  • Significant malware analysis, virus exploitation and mitigation techniques experience
33

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Conduct deep-dive intelligence analysis of suspicious activity and attempted attacks
  • Contribute to Threat Intelligence Reports, providing detailed analysis on cyber events, including relevant political, economic and geopolitical variables. Provide a forward-looking view of the threat, predicting shifts in adversarial intent, goals and strategic objectives
  • Collaborate with peer cyber operations teams to understand events and support analysis of malicious cybersecurity incidents
  • Maintain knowledge of the threat landscape by monitoring open and closed intelligence sources and contribute to quarterly threat landscape briefings
  • Contribute to regular written and verbal briefings and presentations for Global Cybersecurity partners and Lines of Businesses
  • Strong demonstrated knowledge of Cybersecurity and an understanding of the principles of intelligence analysis
  • Excellent understanding of networking concepts and Information Security, including emerging threats and attack methodologies
  • Intelligence Community experience and/or experience at an international institution conducting cyber or security/intelligence related work
34

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Ability to gain and maintain a Public Trust clearance – requires US Citizenship or Permanent Resident status. Must not have traveled outside the US for a combined total of 6 months or more in the last 5 years
  • CEH, GCIA, GCIH, CCNA, OSCP, or CISSP Certification
  • Link analysis and hostile infrastructure tracking
  • Experience conducting network forensics concurrent with IT, military or law enforcement investigations
  • Experience with Splunk or parsing large data sets
  • Experience with PCap data
  • Experience IDS log capture and Einstein reporting
35

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Identify and analyse threats which potentially create a risk to the company, its employees, shareholders, assets and clients
  • Initiate and participate in cyber threat intelligence exchanges with private industry financial sector peers, law enforcement personnel and with other Citi lines of business
  • Through the course of daily internal Citi and external exchanges, be prepared to share analytic discoveries and developments with CIC analytics personnel and with the CIC leadership team
  • Maintain a general situational awareness of developing and potential malicious cyber activity in Mexico and be able to brief counter-parts in CIC as appropriate
  • Engage with peers in Citi’s Cyber Security Fusion Centre (CSFC) to share information and collaborate on threats impacting the Citi franchise in Mexico
  • Review threat information and maintain threat repository
  • 2+ years in a cyber threat intelligence job function
  • CISSP or CISA Certification preferred
  • Bachelor Degree in Systems, Mathematics, Engineering any kind
  • Strong intelligence analytical background
  • Familiarity with open source intelligence service providers and methodologies
  • Previous Intelligence and/or Law Enforcement background(s) a plus
  • In-depth understanding of intelligence analysis and production; either with private industry or government service
  • Working knowledge of IS programs including, Incident Management, Vulnerability Assessment, Cyber Intelligence, Infrastructure Defence, Security Operations
  • Understanding of major threats and threat actors
  • Possesses the ability to review information to determine its significance, validate its accuracy and assess its reliability
  • Able to conduct moderately complex analysis of information from multiple sources to arrive at a conclusion and present key analytic judgments
  • English 80%
36

Cyber Threat Intelligence Analyst Senior Resume Examples & Samples

  • A creative person who enjoys investigating and identifying cyber threats and taking action to prevent or mitigate those threats
  • Working knowledge of various detection and prevention systems, their capabilities and application
  • Broad knowledge of technology and how it can be exploited
  • Understand the technical details of various attacks, including network, web application and wireless exploits
  • Splunk, maltego, scripting, experience performing Hunting activities; prior experience analyzing logs, netflow and packets
  • Exceptional analytical and problem solving skills; ability to identify, escalate, investigate and resolve issues
  • Capable of sharing knowledge, mentoring, and training other team members
  • Ability to manage and prioritize complex and occasionally competing tasks
  • Self-motivated with the ability to work independently and as a member of a team
  • Experience with reverse engineering of malware preferred
  • Penetration testing experience is a plus
  • Strong interpersonal and communication skills required to effectively interact with all levels, up to and including senior management
  • Working knowledge of consumer and commercial banking across multiple channels preferred
37

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Strong analytical and problem solving skills. Practical experience with Linux and Windows operating systems
  • Familiarity with common programming or scripting languages
  • Educational knowledge of log, network, and system forensic investigation techniques
  • Educational knowledge of diverse operating systems, networking protocols, and systems administration
  • Educational knowledge and/or limited experience with common indicators of compromise and of methods for detecting security incidents
  • Educational knowledge of TCP/IP Networking and knowledge of the OSI model
  • Educational knowledge of OS management and Network Devices
  • Educational knowledge performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs, or intrusion prevention logs
  • Excellent problem solving, critical thinking, and analytical skills - ability to deconstruct problems
  • Experience with packet analysis (Wireshark) and Malware analysis preferred
  • Bachelor’s degree in Computer Science, Computer Analysis, Information Assurance, Intelligence and Security Systems, or other relevant field of study or equivalent combination of education and work experience
38

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Processes both internal and external Cyber Threat Intelligence for determination of impact, hunting to determine scope, and implementation of mitigations to defend Verizon’s enterprise
  • Recommends new intel feeds and changes to current feed intake
  • Conduct pivoting analysis on Threat Intelligence to identify current impact or proactively process mitigations for defense through security technologies and proactive mitigations including zero-day patching identification, anomalous behavior, and recommendations of remediation action
  • Support junior team members in methods to process tactical mitigations based on results of analysis and determination of threat validity
  • Drive support for the Threat Management Center during incident response and threat monitoring activities to include intelligence context and analysis support, provide industry expertise and recommend relevant remediation and countermeasures
  • Conduct trending and correlation of cyber intelligence for the purposes of attribution and establish strategic countermeasures to increase Verizon’s defenses, including customized signatures, in-house identified indicators of compromise and behaviors associated with targeted behavior, with support from the Threat Monitoring team
39

Cyber Threat Intelligence Analyst With Top Secret Clearance Resume Examples & Samples

  • Designs, implements, integrates, configures and tests computer and network security solutions to manage the network/system's firewalls and intrusion detection systems
  • Provides Root Cause Analysis, Trend Analysis, and Predictive Analysis support to Vulnerability Assessors and Incident Handlers in support of event response actions and persistent active monitoring efforts
  • Coordinate with members of intrusion analysis, incident response, vulnerability assessment, external assessment, and cyber threat analysis teams to expand the capabilities of the organization
  • Triage, process and analyze cyber threats originating from the various Intel feeds and analytics systems
  • Perform post event analysis on logs, traffic flows, and other activities to identify malicious activity
  • Reviewing weekly, monthly and on demand threat intelligence reports
  • Establishes and maintain open lines of communication with a wide range of data asset owners throughout the Intelligence Community (IC)
  • Facilitate Analyst to Analyst Exchange relationships for members of the team throughout the IC
  • Develops intelligence process to acquire, synthesize, and disseminate all-source Intelligence data to assist Incident Handlers in identifying and disrupting adversary cyber kill chain activities
  • Participation in classified briefings that may help inform intelligence efforts and the ability to articulate assessments based on provided information
  • Advises and assist Incident Handlers on production of threat-specific IDS/IPS content
  • Designs and implements information assurance and security engineering systems with requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management)
  • Assesses and mitigates system security threats and risks throughout the program life cycle
  • Verifies security requirements; performs system certification and accreditation planning and testing and liaison activities
  • Supports secure systems operations and maintenance
  • Processes information about situations and entities of strategic, operational or tactical importance; characterizes possible future actions and identifies possible courses of action or remedies
  • Develops specialized intelligence products, threat analyses, production support, and tailored intelligence products such as fusion intelligence, warning intelligence, estimative intelligence or psychological profiling
  • Develops moderately complex briefings, reports and short notice position papers; reviews, approves and compiles reports, overseeing submission of documentation to relevant databases, mining those databases as needed and as identified to further compile and analyze information, presents briefings to key personnel
  • Collaborates and supports broader security project teams
  • Oversees the processing of incoming reports and messages, determining significance and reliability of incoming information. Integrates incoming intelligence and operational information to maintain situation awareness displays. Identifies issues and concerns and escalates as appropriate
  • Possess TS/SCI clearance with current investigation
  • Experience working with intelligence processes, policies and procedures
  • Ability to work independently with limited supervision and take the initiative to enable continuous process improvement
  • Ability to prepare and present research findings across multiple levels of consumers (Executive to Analyst)
  • Motivated, detail-oriented, individual who can demonstrate proactive analytical skills and work professionally with peers and customers within a demanding mission environments
  • 3+ years working in IT security and/or cyber security/threat intelligence job, preferably a 24x7 operational environment
40

Senior Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Lead and take action on a diverse range of technical and threat information related to the cyber-enabled fraud threat landscape
  • Conduct deep-dive analysis to draw out cyber-enabled fraud trend analysis and context, drawing relevant conclusions and assessment. Continual added value is essential
  • Increase Barclays ability in the technical analysis of information linked to cyber-fraud cases, both external and internal, in order to generate actionable intelligence to prevent further attacks against Barclays
  • Conduct and communicate analysis into cyber threat campaigns, threat actors and threat evolution, placing into context the resulting current and future threat to Barclays
  • Develop additional skills and capability to deliver team objectives, identifying needs and making opportunities to fulfil these. Contribute to the growth of the team’s technical capability and understanding of cyber fraud and delivery by utilising (learning if necessary and) suitable tools and analysis
  • Manage and respond to stakeholder intelligence requirements, producing appropriate output for a range of audiences from Board level through to all staff
  • Provide advice and guidance to wider Intelligence team in relation to technical matters as and when required
  • 5+ years of experience working in either cyber-fraud intelligence collection & analysis or cyber-enabled fraud investigations
  • Experience of analytical tools and capabilities used in a Cyber Intelligence function
  • Experience of analytical tools used for fraud analytics
  • An understanding of the current and developing payment methods and technologies landscape and the cyber-fraud threats that are used to compromise these methods and technologies
  • Experience of interpreting security and fraud events and adding context to these
  • Basic knowledge of security network architectures (e.g. Firewalls, DMZ, proxies, DNS, web and mail servers) and the principles of network security
  • Experience of monitoring and extracting data from underground card shops and AVC sites located in deep and dark web spaces
  • Ability to normalize and analyse large datasets, often in unstructured formats
41

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Bachelors' Degree and a minimum of 5 years of related technical experience; or an additional 4 years of work experience can be substituted in lieu of a degree
  • Position is based in Morrisville, NC and does not provide relocation assistance
  • Link analysis and hostile infrastructure trackingExcellent written and verbal communication skills
42

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Triage, process, and analyze cyber threats originating from the various Intel feeds and analytics systems
  • Perform detailed analysis of threats, combining sound analytical skills with advanced knowledge of IT security and network threats
  • Analyze cyber threat data and correlate with understanding of existing environments
  • Liaise with service providers, ISACs, ISAOs, and enforcement organizations to ensure a continual flow of updated threat data
  • Articulate security issues, analysis, and remediation techniques to peers, leadership, and across business lines
  • Respond to technical security questions and concerns from the business
  • Gather, maintain, and analyze cyber-security data and other key performance indicators for regular executive review
  • Maintain a strong awareness and understanding of the current threat landscape
  • Conduct research on emerging security threats and potential impact
  • Conduct research on and communicate emerging security tools to meet organizational needs
  • Develop and manage security status metrics reports to Leadership
  • Coordinate and conduct special projects as directed by the ULA CISO
  • Provide Information Security Incident Response & Assessment Mgmt
  • Perform Information Security Forensics
  • Perform Cyber Investigations
  • Oversee Penetration Testing Service coordination
  • Experience working in Aerospace and/or DoD environments
  • Familiarity or experience in Intelligence Driven Defense and/or Cyber Kill Chain™ methodology
  • Experience with Information Security frameworks (i.e. ISO/IEC 27001, NIST SP 800-53, NIST SP 800-37), and service delivery frameworks (e.g. ITIL)
  • Experience with Antivirus/Malware Console management
  • Experience with Windows and Linux/UNIX systems
43

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Must be able to articulate complex Cyber Threats to non-technical business leaders
  • Ability to train security concepts
  • 5-7 years experience in Information Security, Criminal Justice system, Intelligence operations
  • BS in Information Assurance, Information Security, Strategic Studies, Cyber Intelligence or similar discipline
  • Academic and educational requirements can be substituted for Military or Governmental Agency Intelligence positions. This will based upon Rank, Time in Service, and Military Occupational Specialties (MOS). Positions include Information Operations, Intelligence, Cyber Warfare, Network Defense, Electronic Site Exploitation, or equivalent responsibilities
44

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Conceptualize and produce clear, concise and well documented multi-source cyber threat intelligence reports, CIC initiated cyber products, and oral presentation when required
  • Identify and analyze threats which potentially create a risk to the company, its employees, shareholders, assets and clients
  • Initiate and participate in host-nation cyber threat intelligence exchanges with private industry financial sector peers, law enforcement personnel, when applicable, and with other Citi lines of business
  • Through the course of daily internal Citi and host-nation exchanges, be prepared to share analytic discoveries and developments with CIC analytics personnel and with the CIC leadership team
  • Maintain a general situational awareness of developing and potential malicious cyber activity in ASPAC and be able to brief counter-parts in New York, New Jersey, and Washington DC as appropriate
  • Work closely with the local technology risk teams to assess risk and provide recommendations for improving our security posture
  • Work closely with other cyber threat and security personnel and workcenters to identify duplicative tasks and projects, initiate collaborative analytic projects and submit recommendations to CIC leadership on potential corrective actions and/or collaborative endeavours
  • Actively initiate and engage in cyber threat discussions and decisions which support and align with Citi’s established values and the principles of Citi’s Execution 2.0
  • Assist Technology peers in regular production and dissemination of intelligence reports
  • Given the CIC is part of Citi Operations & Technology Risk Management, the candidate will not only have CIC Management career progression opportunities but also career opportunities in the Citi Technology Risk, Information Security, and Incident Management departments
  • Position will be located in Sydney or Singapore
  • Experience in cyber security aspects of multiple platforms, operating systems, software, etc. communications and network protocols
  • 3+ years in a cyber threat intelligence job function
  • Understanding of networking protocols and infrastructure designs; including routing, firewall functionality, host and network intrusion detection systems, encryption, load balancing, and other network protocols
  • Previous Intelligence and/or Law Enforcement background(s), a plus
  • Strong communication and diplomacy skills are required
  • Strong project management and analytical skills
  • Excellent communication skills, analytical ability, strong judgment and leadership skills, and the ability to work effectively with clients and IT management and staffs
  • Ability to communicate technical issues to technical and non-technical business representatives
  • Working knowledge of IS programs including, Incident Management, Vulnerability Assessment, Cyber Intelligence, Infrastructure Defense, Security Operations. Understanding of major threats and threat actors
  • Can conduct moderately complex analysis of information from multiple sources to arrive at a conclusion and present key analytic judgments
  • Understanding of a variety of structured analytic techniques (examples: Red Team Analysis, Structured Brainstorming, Key Assumption Check, Analysis of Competing Hypotheses, Devil's Advocacy, and Alternative Futures Analysis
45

Cyber Threat Intelligence Analyst, AVP Resume Examples & Samples

  • As a team member in MUFG Enterprise Information Security Threat & Vulnerability Management, help to define, ratify, maintain and improve the Threat Intelligence program
  • Management Program; and the framework that defines the threat intelligence priorities
  • Perform cyber threat intelligence operations including intelligence collection (IOCs), tracking threat actors, identifying and tracking malicious infrastructure
  • Respond to research requests from stakeholders with timely and accurate assessments and reporting
  • Proactively research relevant threats, provide intelligence briefings to stakeholders and produce reports and intelligence products
  • Partner with the lines of business to provide continuous awareness of key threats and risks that may impact the Business
  • Support prototyping and continuous development/integration of tools to store, exchange, and analyse threat and incident data
  • Implementation of a TIPS industry standard platform along with open source and commercial intelligence feeds
  • Drive and coordinate threat life cycle management, recommend actions that strengthen controls
  • Experience with Threat Intelligence or Incident Response processes
  • Working knowledge of FS-ISAC and similar open/commercial threat intelligence feeds
  • Enterprise TIPS platform such as Anamoli and ThreatConnect
  • Prior experience with SIEM tools and Splunk is helpful
  • Technical writing experience and ability to research, perform and articulate threat analysis
  • Creation of periodic articles on Threat Intelligence analysis, activity and exposures
  • Ability to automate reporting processes using scripting languages (Python, Perl, Unix Shell or VBA) a plus
  • An application development background or previous experience with developing or supporting applications, a plus
  • Ability to work across team boundaries to achieve goals
  • Bachelor's Degree in Business, Computer Sciences, or equivalent prior work experience in a related field
  • Maintain or willing to pursue certification in an information security related field. The following are recommended: CISSP, CISM, GSEC, GIAC, GPEN
  • Results driven, with a strong sense of accountability
  • Great team player to work with colleagues and managers
  • A pro-active, motivated approach while following management direction for task completion in time
  • The ability to operate with urgency and prioritize work accordingly
  • A structured and logical approach to solving business challenges
  • A creative and innovative approach to work
  • The ability to manage workloads and tight deadlines
46

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Effectively ascertain and leverage trustworthy open and closed-source cyber threat intelligence data feeds
  • Identify emerging and persistent threats to the organization’s networks, systems, and applications
  • Independently research and comprehensively analyze actionable cyber threat observables pertinent to the organization
  • Provide analysis reports in numerous formats based upon cyber threat research
  • Perform complex project support for security incident response efforts
  • Provide technical guidance pertaining to risks and control measures associated with emerging threats
  • Independently design, recommend, plan, develop and support implementation of project-specific security solutions to meet tactical, and control requirements
  • Develop reports using data hosted in multiple sources (e.g. spreadsheets, databases) and communicate clearly to management and other team members
  • Identify potential security exposures that may currently exist or may pose a potential future threat to the U.S. Firm’s applications. Ensure Cyber Defense management is notified when these exposures are identified, as well as a proposed solution for remediation
  • Strong skills in tactical, operational, and strategic level cyber threat intelligence
  • Advanced understanding of cyber threat vectors and countermeasures
  • Experience in vulnerability research, malware analysis and exploit investigation
  • Familiarity with YARA, OpenIOC, and STIX frameworks
  • Understanding of Linux/Unix platforms
  • Understanding of Cloud Infrastructure and Cloud Security
  • 3+ years of information security experience, preferably in the areas of cyber threat intelligence, vulnerability management, vulnerability scanning, or penetration testing
  • Familiar with and able to apply time-proven, generally-accepted security methods, concepts and techniques as they relate to the Deloitte U.S. Firms
  • Strong negotiation skills and ability to interact effectively with direct managers and staff in both technical and business roles. Able to defuse situations, work around defensive attitudes, and deal with diverse personalities to achieve assignment objectives
  • Solid understanding of networking (WAN, LAN, wLAN), network domains (Internet, intranet, DMZ), communication techniques/protocols (IP and others), and their combined effects on network and host systems security
  • Ability to learn and retain new skills as required meeting a changing technical environment
  • Ability to travel occasionally (up to 25%), including international travel
  • Ability to occasionally work non-standard shifts and/or on-call to support the requirements of the organization
  • Strong written and verbal communication skills, fluent English. Additional language skills a plus
  • Ability to communicate technical details in a clear, comprehensible manner
47

Cyber Threat Intelligence Analyst Resume Examples & Samples

  • Have three to five years of experience in information security directly working with or dedicated to threat intelligence
  • Knowledge of attack methods, network/endpoint forensic analysis, and malware analysis
  • Specialized knowledge of threat actors and campaigns
  • Knowledge of different threat actor types and their motivation
  • Understanding of intelligence development process, procedures and techniques
  • Experience working with threat hunting teams and incident response teams
  • Previous experience working in a Security Operations Center or Intelligence Function with focus on Computer Network Defense
  • Previous experience with Threat Intelligence Tools and Platforms
  • Understand cyber risk and relevance to threat landscape
  • Strong communication and presentation skills along with the ability to work in a highly collaborative environment
  • Strong relationship skills and collaborative style to enable success across multiple partners
  • Demonstrates effective organizational and technical skills
  • Ability to write intelligence and technical articles for knowledge sharing
  • Experience with statistical modeling and analysis experience to infer possible cybersecurity threats
  • Awareness of different threat data sources
  • General understanding of threat data vs information vs intelligence