12,884 Cybersecurity jobs in the United States
Cybersecurity Threat Intelligence Lead
Posted 7 days ago
Job Viewed
Job Description
Become a part of the diverse and inclusive team within our nationally recognized award-winning Bank that is one of the strongest in the nation. Woodforest National Bank is privately owned, and our Employee Stock Ownership Plan is the largest shareholder. We focus on building relationships and discovering opportunities to better serve our communities and understand the financial needs of every customer we serve. At Woodforest we care and prove it by volunteering with local charities and foodbanks to give back to the communities we serve. By joining Woodforest you will become a part of one of the largest employee-owned banks in the country!
The Cybersecurity Threat Intelligence Lead will serve as the primary (or SME) on threats against the Bank's reputation, brand, and systems through multiple threat intelligence sources. The role will be responsible for design and implementation of threat intelligence systems and will also play a significant role in threat hunting and penetration testing activities.
This position will work 'in-office' during an initial training period. Once the training period is successfully completed, this position, at the manager's discretion, is eligible for hybrid work schedule.
Key Responsibilities:
· Works closely with internal technology teams, business stakeholders, MSSP, and outside vendors to research, analyze and monitor security threats.
· Mentors other analysts responsible for threat intel, incident response, network, cloud, endpoint and database security.
· Deploys and manages security solutions to assist with logging, alerting, and threat analysis.
· Security system monitoring and alerting appropriate parties of vulnerabilities, attacks, and other security issues.
· Recommends and implements policies and procedures to ensure adherence to security standards.
Competencies Required:
· Demonstrated success in managing, analyzing, and solving complex network technical issues.
· Technical knowledge of security configurations, log analysis, intrusion detection and mitigation.
· Strong verbal communication and technical writing skills with an ability to effectively interact with and convey information to people who possess varying levels of understanding on applicable topics.
· Ability to work independently while supporting a team environment.
· Solid understanding of network security practices, systems, and standards.
· Strong technology skills, including intermediate proficiency with Microsoft Office (Word, Excel, Outlook, PowerPoint, Visio) SIEM and EDR platforms.
· Customer service orientation with proven process and project management skills.
· Strategic and problem-solving mindset with developed analytical abilities and organizational skills.
Minimum Qualifications/Experience:
· 5 years' network or systems administration experience required.
· 2 years' EDR management experience required.
· 1 years' SIEM management experience required.
· Other beneficial experience, (i.e., VA, IPS, Cloud Security, Routing and Switching, Vulnerability Management, Threat Reputation/Intel Solution, CASB, Python, or Automation/Orchestration), preferred.
· Financial services or banking industry experience preferred.
Formal Education & Certification:
· IT related degree preferred.
Work Status:
· Full-Time.
Supervisory Responsibility:
· None.
Travel:
· Less than 10% travel expected.
Working Conditions:
· Conditions involve lifting no more than ten pounds, sitting most of the time, but may involve walking, moving, or standing for brief periods, and occasionally lifting and carrying articles like files, ledgers, folders, etc.
Disclaimer:
This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Nothing herein restricts management's right to assign or reassign duties and responsibilities to this job at any time.
Woodforest is an Equal Opportunity Employer, including Disability and Veterans.
**Job:** **Technology Services*
**Organization:** **Texas - Houston*
**Title:** *Cybersecurity Threat Intelligence Lead*
**Location:** *Texas-The Woodlands*
**Requisition ID:** * *
Cybersecurity Analyst - Threat Intelligence
Posted today
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze threat intelligence feeds, news, and reports to identify emerging cyber threats.
- Research and profile threat actors, their motivations, and their methods.
- Develop and maintain threat intelligence databases and knowledge bases.
- Analyze malware, phishing attempts, and other cyberattack vectors.
- Assess the potential impact of threats on the organization's infrastructure and data.
- Develop and disseminate timely threat advisories and situational reports to relevant stakeholders.
- Collaborate with security operations and incident response teams to provide context and support during investigations.
- Contribute to the development and refinement of security policies, procedures, and controls based on threat intelligence.
- Utilize various threat intelligence platforms and tools effectively.
- Stay current with the latest cybersecurity trends, vulnerabilities, and attack methodologies.
- Participate in tabletop exercises and simulations to test incident response capabilities.
- Provide expert guidance on threat landscapes and risk assessments.
- Bachelor's degree in Computer Science, Information Security, Cybersecurity, or a related field.
- Minimum of 3 years of experience in cybersecurity, with a focus on threat intelligence, security operations, or incident response.
- Strong understanding of cyber threat actors, attack vectors, malware analysis, and TTPs.
- Experience with threat intelligence platforms (TIPs) and security information and event management (SIEM) systems.
- Proficiency in data analysis and correlation techniques.
- Knowledge of networking protocols, operating systems, and common vulnerabilities.
- Excellent analytical, research, and problem-solving skills.
- Strong written and verbal communication skills, with the ability to articulate complex technical information clearly.
- Ability to work independently, manage time effectively, and prioritize tasks in a remote setting.
- Relevant certifications such as CompTIA Security+, CEH, GIAC, or similar are highly desirable.
- Familiarity with scripting languages (e.g., Python) for automation is a plus.
Cybersecurity Threat Intelligence Analyst
Posted 2 days ago
Job Viewed
Job Description
Cybersecurity Threat Intelligence Analyst
Posted 2 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze threat intelligence feeds, security alerts, and open-source information to identify potential threats to the organization.
- Develop and maintain a deep understanding of threat actor tactics, techniques, and procedures (TTPs).
- Produce timely and actionable threat intelligence reports for various stakeholders, including security operations, incident response, and executive leadership.
- Conduct research on emerging threats, vulnerabilities, and attack vectors relevant to our industry and technology stack.
- Collaborate with security operations center (SOC) analysts to enhance detection capabilities and improve incident response playbooks.
- Develop and refine threat hunting methodologies based on intelligence insights.
- Build and manage relationships with external intelligence sharing communities and vendors.
- Contribute to the continuous improvement of the threat intelligence program, including tooling and processes.
- Provide expert guidance on threat landscapes and risk assessments.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field, or equivalent practical experience.
- 3-5 years of experience in cybersecurity, with a focus on threat intelligence, incident response, or security operations.
- Proven ability to analyze complex data from multiple sources and translate it into actionable intelligence.
- Familiarity with common threat intelligence platforms (TIPs) and security information and event management (SIEM) systems.
- Strong understanding of cyber threat landscapes, attacker methodologies, and malware analysis.
- Excellent written and verbal communication skills, with the ability to present technical information to non-technical audiences.
- Proficiency in scripting languages (e.g., Python) for automation and data analysis is a plus.
- Relevant certifications such as GCTI, GCIH, or CISSP are highly desirable.
Cybersecurity Analyst - Threat Intelligence
Posted 3 days ago
Job Viewed
Job Description
Cybersecurity Analyst, Threat Intelligence
Posted 8 days ago
Job Viewed
Job Description
Key responsibilities include: monitoring security alerts and threat feeds, conducting in-depth analysis of malware and attack techniques, developing threat hunting methodologies, creating detailed reports on threat actor TTPs (Tactics, Techniques, and Procedures), and collaborating with incident response teams to contain and eradicate threats. You will also contribute to the development and refinement of security policies and procedures, and stay abreast of the latest cybersecurity trends and technologies. The ideal candidate possesses a Bachelor's degree in Computer Science, Cybersecurity, or a related field, along with 3-5 years of experience in cybersecurity analysis, with a specific focus on threat intelligence or incident response. Strong knowledge of SIEM tools, endpoint detection and response (EDR) solutions, network security principles, and various operating systems is essential. Excellent analytical and problem-solving skills, coupled with outstanding written and verbal communication abilities, are required. Certifications such as CompTIA Security+, CEH, or CISSP are a plus. This role demands a high level of self-discipline, a keen eye for detail, and the ability to work autonomously in a remote environment. Help safeguard our client's digital assets and reputation by joining our elite cybersecurity team, working from your home office anywhere in the US, supporting operations near Provo, Utah, US .
Cybersecurity Threat Intelligence Analyst
Posted 9 days ago
Job Viewed
Job Description
Key responsibilities include:
- Monitoring and analyzing global threat landscapes, identifying emerging threats and attack vectors.
- Collecting, correlating, and analyzing threat intelligence data from open-source intelligence (OSINT), commercial feeds, and internal security tools.
- Developing and disseminating threat intelligence reports to relevant stakeholders, including technical teams and executive leadership.
- Identifying indicators of compromise (IOCs) and developing detection rules for security monitoring systems.
- Providing context and attribution for threat actors and their motivations.
- Supporting incident response investigations with timely and accurate threat intelligence.
- Collaborating with threat hunting teams to proactively search for malicious activity.
- Contributing to the development and improvement of threat intelligence platforms and processes.
- Building relationships with external threat intelligence communities and information-sharing groups.
- Staying current with the latest cybersecurity trends, vulnerabilities, and threats.
The ideal candidate will hold a Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field. Relevant certifications such as GIAC Certified Intrusion Analyst (GCIA), Certified Threat Intelligence Analyst (CTIA), or equivalent are highly preferred. A minimum of 3-5 years of experience in cybersecurity, with a focus on threat intelligence, incident response, or security operations is required. Demonstrable experience with threat intelligence platforms, SIEM tools, and security analytics is essential. Strong understanding of various threat actor TTPs (Tactics, Techniques, and Procedures), malware analysis, and network security concepts is a must. Excellent written and verbal communication skills, with the ability to clearly articulate complex technical information to diverse audiences, are critical. This is an on-site position located in Philadelphia, Pennsylvania, US , requiring the selected candidate to work primarily from our client's secure facility.
Be The First To Know
About the latest Cybersecurity Jobs in United States !
Cybersecurity Threat Intelligence Analyst
Posted 9 days ago
Job Viewed
Job Description
Cybersecurity Analyst - Threat Intelligence
Posted 12 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze global threat intelligence sources, including open-source intelligence (OSINT), dark web forums, and commercial threat feeds.
- Identify, track, and analyze emerging cyber threats, vulnerabilities, and attack vectors relevant to the organization.
- Develop and maintain profiles of threat actors, including their tactics, techniques, and procedures (TTPs).
- Produce timely and actionable threat intelligence reports and alerts for various stakeholders, including security operations, incident response, and executive leadership.
- Collaborate with the Security Operations Center (SOC) and Incident Response teams to provide context and support during security incidents.
- Develop and implement threat hunting methodologies to proactively identify advanced persistent threats (APTs) within the network.
- Assess the potential impact of identified threats and recommend appropriate defensive measures.
- Contribute to the development and refinement of security policies, procedures, and controls based on threat intelligence insights.
- Manage and maintain threat intelligence platforms and tools.
- Build and maintain relationships with external cybersecurity communities and information-sharing groups.
- Stay current with the latest cybersecurity trends, threats, and technologies.
- Participate in security awareness training and provide subject matter expertise.
- Conduct research on specific cyber threats and vulnerabilities as required.
- Evaluate the effectiveness of defensive security controls against known threats.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field, or equivalent practical experience.
- Minimum of 4-6 years of experience in cybersecurity, with a significant focus on threat intelligence, incident response, or security analysis.
- Demonstrated expertise in analyzing various types of threat intelligence data (e.g., malware, indicators of compromise (IOCs), TTPs).
- Proficiency with threat intelligence platforms, SIEM tools, and other security technologies.
- Strong understanding of cyber threat actors, their motivations, and methodologies.
- Excellent analytical, critical thinking, and problem-solving skills.
- Ability to research, synthesize, and present complex technical information clearly and concisely.
- Strong written and verbal communication skills.
- Relevant cybersecurity certifications (e.g., CISSP, GIAC) are highly desirable.
- Ability to work independently and collaboratively in a remote environment.
- Experience with scripting languages (e.g., Python) for automating intelligence gathering and analysis is a plus.
This is an exciting opportunity to be at the forefront of cybersecurity defense, working remotely and contributing to the security of our operations in the Miami, Florida, US area.
Cybersecurity Analyst - Threat Intelligence
Posted 14 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze security alerts, logs, and threat intelligence feeds from various sources.
- Identify, investigate, and respond to security incidents and potential breaches.
- Develop and maintain threat intelligence reports, including adversary tactics, techniques, and procedures (TTPs).
- Provide actionable intelligence to security operations and incident response teams.
- Conduct vulnerability assessments and penetration testing to identify weaknesses.
- Recommend and implement security controls and best practices to enhance overall security posture.
- Stay current with the latest cybersecurity threats, vulnerabilities, and attack vectors.
- Develop and refine incident response playbooks and procedures.
- Collaborate with internal teams and external partners to share threat intelligence and coordinate responses.
- Contribute to the development of security awareness training materials.
- Participate in security architecture reviews and provide input on secure design principles.
- Manage and maintain security tools and technologies.
- Evaluate new security technologies and solutions.
- Ensure compliance with relevant security regulations and standards.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- 3+ years of experience in cybersecurity, with a focus on threat intelligence, incident response, or security analysis.
- Proficiency in security information and event management (SIEM) tools (e.g., Splunk, QRadar).
- Strong understanding of networking protocols, operating systems, and common attack vectors.
- Experience with threat intelligence platforms and data analysis techniques.
- Familiarity with scripting languages (e.g., Python, PowerShell) for automation.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong written and verbal communication skills, with the ability to clearly articulate complex technical information.
- Relevant certifications such as CISSP, CEH, CompTIA Security+ are a plus.
- Ability to work independently and manage time effectively in a remote setting.