7,714 Cybersecurity Specialists jobs in the United States

Cybersecurity Threat Intelligence Lead

77381 The Woodlands, Texas Woodforest National Bank

Posted 17 days ago

Job Viewed

Tap Again To Close

Job Description

Take the next step toward your new career today!
Become a part of the diverse and inclusive team within our nationally recognized award-winning Bank that is one of the strongest in the nation. Woodforest National Bank is privately owned, and our Employee Stock Ownership Plan is the largest shareholder. We focus on building relationships and discovering opportunities to better serve our communities and understand the financial needs of every customer we serve. At Woodforest we care and prove it by volunteering with local charities and foodbanks to give back to the communities we serve. By joining Woodforest you will become a part of one of the largest employee-owned banks in the country!
The Cybersecurity Threat Intelligence Lead will serve as the primary (or SME) on threats against the Bank's reputation, brand, and systems through multiple threat intelligence sources. The role will be responsible for design and implementation of threat intelligence systems and will also play a significant role in threat hunting and penetration testing activities.
This position will work 'in-office' during an initial training period. Once the training period is successfully completed, this position, at the manager's discretion, is eligible for hybrid work schedule.
Key Responsibilities:
· Works closely with internal technology teams, business stakeholders, MSSP, and outside vendors to research, analyze and monitor security threats.
· Mentors other analysts responsible for threat intel, incident response, network, cloud, endpoint and database security.
· Deploys and manages security solutions to assist with logging, alerting, and threat analysis.
· Security system monitoring and alerting appropriate parties of vulnerabilities, attacks, and other security issues.
· Recommends and implements policies and procedures to ensure adherence to security standards.
Competencies Required:
· Demonstrated success in managing, analyzing, and solving complex network technical issues.
· Technical knowledge of security configurations, log analysis, intrusion detection and mitigation.
· Strong verbal communication and technical writing skills with an ability to effectively interact with and convey information to people who possess varying levels of understanding on applicable topics.
· Ability to work independently while supporting a team environment.
· Solid understanding of network security practices, systems, and standards.
· Strong technology skills, including intermediate proficiency with Microsoft Office (Word, Excel, Outlook, PowerPoint, Visio) SIEM and EDR platforms.
· Customer service orientation with proven process and project management skills.
· Strategic and problem-solving mindset with developed analytical abilities and organizational skills.
Minimum Qualifications/Experience:
· 5 years' network or systems administration experience required.
· 2 years' EDR management experience required.
· 1 years' SIEM management experience required.
· Other beneficial experience, (i.e., VA, IPS, Cloud Security, Routing and Switching, Vulnerability Management, Threat Reputation/Intel Solution, CASB, Python, or Automation/Orchestration), preferred.
· Financial services or banking industry experience preferred.
Formal Education & Certification:
· IT related degree preferred.
Work Status:
· Full-Time.
Supervisory Responsibility:
· None.
Travel:
· Less than 10% travel expected.
Working Conditions:
· Conditions involve lifting no more than ten pounds, sitting most of the time, but may involve walking, moving, or standing for brief periods, and occasionally lifting and carrying articles like files, ledgers, folders, etc.
Disclaimer:
This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Nothing herein restricts management's right to assign or reassign duties and responsibilities to this job at any time.
Woodforest is an Equal Opportunity Employer, including Disability and Veterans.
**Job:** **Technology Services*
**Organization:** **Texas - Houston*
**Title:** *Cybersecurity Threat Intelligence Lead*
**Location:** *Texas-The Woodlands*
**Requisition ID:** * *
View Now

Senior Cybersecurity Threat Intelligence Analyst

33166 Miami Springs, Florida ManTech

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

**MANTECH** seeks a motivated, career and customer-oriented **Senior** **Cybersecurity Threat Intelligence Analyst** to join our team in **Doral, FL** .
**Responsibilities include but are not limited to:**
+ Proactively identifies, analyzes, and mitigates cybersecurity threats to the organization.
+ Possesses advanced skills in threat intelligence collection, analysis, and dissemination, with a deep understanding of the threat landscape and attack vectors.
+ Leads the development and implementation of threat intelligence strategies, ensuring the organization has timely and actionable insights to defend against evolving threats.
+ Conducts in-depth research on threat actors, malware, vulnerabilities, and attack techniques, producing comprehensive threat assessments and providing expert guidance on mitigation strategies.
+ Collaborates effectively with Security Teams, incident responders, and other stakeholders to proactively address threats and enhance the organization's security posture.
+ Is responsible for developing and maintaining threat intelligence platforms and tools, automating intelligence gathering, staying abreast of trends and techniques, and provides direction and mentorship to subordinate staff and coordinate with other Cybersecurity Threat Intelligence Analyst
**Minimum Qualifications:**
+ BA/BS in field necessary to assume Cybersecurity Threat Intelligence Analyst duties or 4 years of additional experience in lieu of a degree
+ 9+ years of experience with 5+ years of relevant Cybersecurity Threat Intelligence Analyst experience.
+ Progressive experience in cybersecurity threat intelligence or related areas, with a focus on threat analysis and mitigation.
+ Demonstrated expertise in collecting, analyzing, and disseminating threat intelligence from various sources (e.g., open-source intelligence (OSINT), threat feeds, security vendors).
+ Strong understanding of the cybersecurity threat landscape, including common attack vectors, threat actors, malware, and vulnerabilities.
+ Experience with threat intelligence platforms and tools (e.g., ThreatConnect, Anomali, MISP).
+ Experience with data analysis and visualization techniques.
+ CompTIA Security+ or equivalent. DoD -M IAT Level II certification.
**Preferred Qualifications:**
+ Master's degree in Cybersecurity, Intelligence Studies, or a related field.
+ Experience with incident response and threat hunting. Experience with malware analysis and reverse engineering, and security automation and orchestration.
+ Experience with developing and implementing threat intelligence strategies and advanced threat intelligence certifications (e.g., TRE). Certifications in digital forensics or incident response (e.g., GCFA, GCIH).
+ Experience with military/diplomatic operations working within a J-6/G-6/S-6 Directorate or with Special Operations Forces (SOF) or the Department of State (DoS), leading and performing cybersecurity risk assessments for and across multiple commands, agencies, and regionally distributed locations in a Security Operations Center (SOC).
+ At least one industry-recognized threat intelligence certification (e.g., Certified Threat Intelligence Analyst (CTIA), GCTI).
+ Experience at a DoD Combatant Command (e.g., SOUTHCOM, NORTHCOM, CENTCOM, CYBERCOM, INDOPACOM, EUCOM, AFRICOM, STRATCOM, TRANSCOM, SOCOM, SPACECOM) or a component is desired.
**Clearance Requirements:**
+ Must have current/active TS/SCI clearance
**Physical Requirements:**
+ Must be able to remain in stationary position for up to 50% of the time.
+ Must be able to deliver clear and effective communication verbally and via email, phone, and virtual communication platforms to interface with co-workers and customers.
+ Must be able to occasionally move about inside an office environment to access file cabinets, office machinery, and communicate with co-workers.
ManTech International Corporation, as well as its subsidiaries proactively fulfills its role as an equal opportunity employer. We do not discriminate against any employee or applicant for employment. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
If you are a qualified individual with a disability and require a reasonable accommodation to apply for a position with ManTech through its online applicant system, please email us at and provide your name and contact information.
View Now

Cybersecurity Analyst Cyber Threat Intelligence

35808 Redstone Arsenal, Alabama TekSynap

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

**Responsibilities & Qualifications**
**TEAM SUMMARY**
Responsible for monitoring and analyzing external cyber threat data to provide insights and actionable intelligence about potential cyber threats. This team triages information collected from different threat intelligence sources, including internal sources, and study the pattern of attacks, their methodology, motive, severity, and threat landscape applicable to a government agency's systems. This team supports enhancing the overall cybersecurity posture of an organization by delivering timely, relevant, information to stakeholders.
**ACTIVITIES & RESPONSIBILITIES**
+ Continuously monitor threat intelligence platforms, feeds, and cybersecurity news to detect emerging threats.
+ Conduct deep-dive investigations into alerts generated by Splunk or other monitoring tools.
+ Develop and maintain threat intelligence reports, dashboards, and threat models.
+ Collaborate with SOC, IR, and vulnerability management teams to contextualize and act on threat intelligence.
+ Support cyber threat hunting initiatives by leveraging threat intelligence indicators and hypotheses.
+ Participate in government-led cyber exercises or red/blue team simulations.
+ Provide regular briefings and updates to leadership and stakeholders on emerging cyber threats and trends.
+ Maintain knowledge of the latest cybersecurity trends, zero-day vulnerabilities, APT groups, and geopolitical developments impacting the threat landscape.
**SKILLS**
+ Cyber Threat Intelligence (CTI) Analysis - Identifying, analyzing, and interpreting cyber threats from various internal and external sources to assess relevance and impact on the organization.
+ Security Information and Event Management (SIEM) Tools - Proficient in using Splunk Enterprise Security for log analysis, alerting, and correlation of security events. Familiar with Microsoft Sentinel for threat detection and response.
+ Incident Response Support - Collaborating with incident response teams to provide threat intelligence that informs remediation and mitigation efforts.
+ Threat Actor Profiling - Studying adversary tactics, techniques, and procedures (TTPs) using frameworks such as MITRE ATT&CK to provide context and attribution.
+ Data Correlation and Enrichment - Correlating disparate data sets (e.g., IOC feeds, vulnerability databases, internal telemetry) to develop actionable intelligence.
+ Report Writing & Briefing - Producing written reports, threat assessments, and briefings for technical and non-technical stakeholders.
+ Communication and Stakeholder Engagement - Interfacing with cross-functional teams and government representatives to convey findings and recommend security posture enhancements.
+ Security Clearance Handling - Operating within a high-security environment with an active Top Secret (TS) clearance; handling and disseminating classified or sensitive information appropriately.
**REQUIRED QUALIFICATIONS**
+ Bachelor's degree, preferably in an IT-related field
+ 10+ years of experience in IT with a minimum of 4 years in Cybersecurity
+ Active TS Clearance
+ Experience with Splunk Enterprise Security
**PREFERRED QUALIFICATIONS & COMPETENCIES**
+ Experience with Microsoft Sentinel
+ Related certifications, such as GIAC Cyber Threat Intelligence (GCTI)
**Overview**
We are seeking an experienced **Cybersecurity Analyst / Cyber Threat Intelligence** in support of a government customer to join our team. The Program Manager will be responsible for ensuring the successful execution of multiple IT initiatives, ensuring alignment with customer objectives, and managing project scope, schedule, budget, and risk. This role requires strong leadership, communication, and problem-solving skills to drive efficiency and deliver results.
TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. "Technology moving at the speed of thought" embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers.
We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays.
Visit us at .
Apply now to explore jobs with us!
By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP".
"As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration".
**Additional Job Information**
**WORK ENVIRONMENT AND PHYSICAL DEMANDS**
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
+ Location: Huntsville Alabama
+ Remote or In-Person: On site
+ Type of environment: Office
+ Noise level: Medium
+ Work schedule: Schedule is day shift Monday - Friday.
+ Amount of Travel: Less than 10%
**PHYSICAL DEMANDS**
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
**WORK AUTHORIZATION/SECURITY CLEARANCE**
+ Active Top Secret Clearance Required
**OTHER INFORMATION**
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
TekSynap is a drug-free workplace. We reserve the right to conduct drug testing in accordance with federal, state, and local laws. All employees and candidates may be subject to drug screening if deemed necessary to ensure a safe and compliant working environment.
**EQUAL EMPLOYMENT OPPORTUNITY**
In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, national origin, disability, age, genetic information, or any other characteristic protected by law (referred to as "protected status"). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment.
**Job Locations** _US-AL-Huntsville_
**ID** _ _
**Category** _Project/Program Management_
**Type** _Regular Full-Time_
View Now

Senior Cybersecurity Threat Intelligence Analyst

10001 New York, New York $110000 Annually WhatJobs

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a highly skilled and analytical Senior Cybersecurity Threat Intelligence Analyst to join their elite security operations team in New York City, New York, US . This role is essential for proactively identifying, analyzing, and mitigating advanced cyber threats that could impact the organization's assets and operations. The ideal candidate will possess a deep understanding of the global threat landscape, adversary tactics, techniques, and procedures (TTPs), and a proven ability to translate complex threat data into actionable intelligence. You will be responsible for collecting, processing, and analyzing vast amounts of threat data from various sources, including open-source intelligence (OSINT), dark web monitoring, commercial threat feeds, and internal security tools. Your analysis will focus on identifying emerging threats, understanding attacker motivations, and predicting future attack vectors. You will produce regular threat intelligence reports, briefings, and alerts for security leadership, incident response teams, and other stakeholders, enabling informed decision-making and risk mitigation strategies. The ability to develop and maintain relationships with external intelligence communities and partners is crucial. This position requires exceptional research skills, critical thinking, and the ability to communicate complex technical information clearly and concisely to both technical and non-technical audiences. You will also contribute to the development and refinement of threat intelligence platforms and methodologies. If you are passionate about staying ahead of cyber adversaries and possess a strong drive to protect sensitive information, this is an exciting opportunity.

Responsibilities:
  • Collect, process, and analyze threat intelligence data from diverse sources (OSINT, dark web, feeds, internal logs).
  • Identify, track, and analyze Advanced Persistent Threats (APTs) and other sophisticated adversaries.
  • Develop comprehensive profiles of threat actors, their TTPs, motivations, and objectives.
  • Produce actionable threat intelligence reports, briefings, and alerts for various audiences.
  • Provide context and analysis to support incident response, vulnerability management, and security architecture decisions.
  • Develop and maintain relationships with external threat intelligence communities and information sharing groups.
  • Contribute to the improvement of threat intelligence collection, analysis, and dissemination platforms and processes.
  • Conduct deep-dive investigations into specific threats and campaigns.
  • Present threat intelligence findings to senior management and technical teams.
  • Stay current with the latest cybersecurity threats, trends, and technologies.
Qualifications:
  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
  • Minimum of 5 years of experience in cybersecurity, with a focus on threat intelligence analysis.
  • Demonstrated experience with various threat intelligence frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain).
  • Proficiency in utilizing OSINT tools and techniques for threat research.
  • Experience analyzing malware, network traffic, and security logs.
  • Strong understanding of geopolitical factors influencing cyber threats.
  • Excellent analytical, critical thinking, and problem-solving skills.
  • Superb written and verbal communication skills, with the ability to present complex information effectively.
  • Relevant certifications (e.g., GCTI, CTIA) are a plus.
Apply Now

Senior Cybersecurity Analyst - Threat Intelligence

21201 Baltimore, Maryland $120000 Annually WhatJobs

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a highly skilled and motivated Senior Cybersecurity Analyst specializing in Threat Intelligence to join their growing Information Security team. This role is critical in identifying, analyzing, and mitigating potential cyber threats to the organization. As a remote-first position, you will have the opportunity to work from anywhere in the US, contributing to our client's robust security posture. You will be responsible for monitoring security alerts, performing in-depth analysis of threat data, developing actionable intelligence, and recommending defensive strategies. The ideal candidate will possess a deep understanding of current cyber threats, attack vectors, and security technologies.

Responsibilities:
  • Monitor and analyze security alerts from various sources, including SIEM, IDS/IPS, and endpoint detection and response (EDR) systems.
  • Conduct in-depth threat intelligence research, including actor tactics, techniques, and procedures (TTPs), malware analysis, and vulnerability assessments.
  • Develop and maintain threat models to anticipate and defend against potential attacks.
  • Correlate threat intelligence data with internal security incidents to identify patterns and trends.
  • Produce timely and actionable threat intelligence reports for various stakeholders, including technical teams and executive leadership.
  • Develop and implement proactive security measures based on threat intelligence findings.
  • Collaborate with incident response teams to provide intelligence support during security investigations.
  • Stay current with the latest cybersecurity threats, vulnerabilities, and industry best practices.
  • Contribute to the continuous improvement of threat intelligence tools and processes.
  • Mentor junior analysts and share knowledge across the security team.

Qualifications:
  • Bachelor's degree in Computer Science, Cybersecurity, or a related field; Master's degree preferred.
  • 5+ years of experience in cybersecurity, with a focus on threat intelligence, security operations, or incident response.
  • Strong understanding of cyber threat landscapes, attack methodologies, and defensive security principles.
  • Proficiency with SIEM, EDR, and other security monitoring tools.
  • Experience with threat intelligence platforms (TIPs) and open-source intelligence (OSINT) gathering.
  • Excellent analytical, problem-solving, and critical-thinking skills.
  • Strong written and verbal communication skills, with the ability to explain complex technical information clearly.
  • Relevant certifications such as CISSP, GIAC (GCIH, GCFA), or similar are highly desirable.
  • Experience with scripting languages (e.g., Python) for automation is a plus.
  • Ability to work effectively in a remote, collaborative environment.
This is a fully remote role, allowing you to contribute to a leading organization from the convenience of your home office. If you are a driven cybersecurity professional passionate about staying ahead of evolving threats, we encourage you to apply.
Apply Now

Lead Cybersecurity Engineer - Threat Intelligence

98101 Seattle, Washington $150000 Annually WhatJobs

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a highly experienced and visionary Lead Cybersecurity Engineer specializing in Threat Intelligence to join their cutting-edge security operations center in Seattle, Washington, US . This senior role demands a deep understanding of global threat landscapes, advanced persistent threats (APTs), and sophisticated attack vectors. You will be responsible for developing and executing our organization's threat intelligence strategy, identifying emerging threats, and providing actionable insights to protect critical assets and sensitive data. This includes leading a team of intelligence analysts, establishing processes for threat hunting, and integrating threat intelligence into our defensive security measures.

Key responsibilities include gathering, analyzing, and disseminating threat intelligence from various sources, such as open-source intelligence (OSINT), dark web monitoring, and vendor feeds. You will conduct in-depth research on threat actors, their motivations, and their tactics, techniques, and procedures (TTPs). The Lead Cybersecurity Engineer will also be tasked with developing custom detection rules, correlating security events, and supporting incident response activities with timely intelligence. You will collaborate closely with security architects, engineers, and SOC analysts to enhance our security posture and reduce our attack surface. The ideal candidate will possess exceptional analytical and problem-solving skills, a proactive mindset, and the ability to mentor and guide junior team members. Expertise in security information and event management (SIEM) systems, threat intelligence platforms (TIPs), and various cybersecurity tools is crucial. This is a unique opportunity to lead and innovate within a critical function, safeguarding the organization against evolving cyber threats.

Key Responsibilities:
  • Develop and implement comprehensive threat intelligence strategies and programs.
  • Lead and mentor a team of cybersecurity threat intelligence analysts.
  • Identify, analyze, and track emerging cyber threats, threat actors, and their TTPs.
  • Collect and curate threat data from diverse sources (OSINT, dark web, commercial feeds).
  • Develop actionable intelligence reports and briefings for technical and executive audiences.
  • Integrate threat intelligence into security operations, incident response, and risk management processes.
  • Design and implement threat hunting methodologies and playbooks.
  • Configure and optimize SIEM and TIP platforms for effective threat detection.
  • Collaborate with security engineering and operations teams to deploy defensive countermeasures.
  • Conduct vulnerability assessments and penetration testing support.
  • Stay current with the latest cybersecurity trends, vulnerabilities, and threat actor methodologies.
  • Contribute to the development of security policies and procedures.

Qualifications:
  • Bachelor's or Master's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
  • Minimum of 7 years of experience in cybersecurity, with at least 3 years focused on threat intelligence or advanced security analysis.
  • Proven experience leading technical teams and managing security projects.
  • Expertise in threat intelligence methodologies, frameworks (e.g., MITRE ATT&CK), and tools.
  • Strong understanding of network security, endpoint security, cloud security, and malware analysis.
  • Proficiency with SIEM, SOAR, and threat intelligence platforms.
  • Excellent analytical, research, and problem-solving skills.
  • Strong written and verbal communication skills, with the ability to present complex technical information clearly.
  • Relevant cybersecurity certifications (e.g., CISSP, GIAC certifications).
  • Experience with scripting or programming languages (e.g., Python, PowerShell) is a plus.
This position offers a highly competitive salary, excellent benefits, and the chance to work at the forefront of cybersecurity in a collaborative and innovative environment.
Apply Now

Senior Cybersecurity Analyst, Threat Intelligence (Remote)

46204 Indianapolis, Indiana $125000 Annually WhatJobs

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client, a leading cybersecurity firm dedicated to protecting global organizations from advanced threats, is seeking a highly skilled Senior Cybersecurity Analyst specializing in Threat Intelligence. This is a fully remote position, offering the flexibility to work from anywhere while contributing to critical security initiatives. The Senior Analyst will be responsible for the end-to-end lifecycle of threat intelligence, including collection, analysis, dissemination, and integration into defensive security operations. You will monitor the threat landscape, identify emerging threats and vulnerabilities relevant to our client's sectors, and develop actionable intelligence reports and alerts. Key responsibilities include researching threat actors, their TTPs (Tactics, Techniques, and Procedures), and motivations; analyzing malware samples and attack vectors; leveraging various threat intelligence platforms and open-source intelligence (OSINT) sources; and collaborating with incident response and security operations teams to enhance threat detection and mitigation capabilities. The ideal candidate will possess a deep understanding of cybersecurity principles, network security, malware analysis, and threat hunting methodologies. A Bachelor's degree in Computer Science, Cybersecurity, or a related field, or equivalent practical experience, is required. A minimum of 6 years of experience in cybersecurity, with a significant focus on threat intelligence, is essential. Relevant certifications such as GIAC, CISSP, or OSCP are highly desirable. Excellent analytical, research, and communication skills are paramount, along with the ability to articulate complex technical information to both technical and non-technical audiences. This role requires a proactive, curious, and detail-oriented individual who is passionate about staying ahead of evolving cyber threats. Join our dedicated remote team and make a significant impact on global cybersecurity.
Apply Now
Be The First To Know

About the latest Cybersecurity specialists Jobs in United States !

Security Analyst - Threat Intelligence

94306 Palo Alto, California Palantir Technologies

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

A World-Changing Company

Palantir builds the worlds leading software for data-driven decisions and operations. By bringing the right data to the people who need it, our platforms empower our partners to develop lifesaving drugs, forecast supply chain disruptions, locate missing children, and more.

The Role

As a Security Analyst on Palantirs Global Security team, you will work alongside various internal teams to analyze potential external threats, and mitigate the risks posed to Palantir leadership, assets, and people. We are looking for a motivated self-starter who is eager to fuse their operational security (OPSEC) expertise, threat investigation skills, and analytical abilities to guide Palantir investigations towards positive security outcomes. In this role you will engage closely with Information Security, Compliance, Legal, Physical Security, and Internal Investigations teams, as well as other internal/external stakeholders. This role requires established open source investigations and research skills, experience in Counterintelligence (CI), strong analytical writing and briefing/debriefing skills, and an appetite to become more technical with data analytics tooling. You must be able to synthesize complex information from various sources and convey risk, as well as present investigative/analytical assessment data, in a clear and concise manner to internal and external stakeholders, including company leadership.

Core Responsibilities
  • Monitor, identify, and analyze external security indicators to determine their impact on Palantir assets.
  • Synthesize data and findings with general trend research to provide investigative support to the Threat Intelligence team and corporate security operations.
  • Utilize sound prioritization skills to triage potential security risks and assess the validity/severity of incidents.
  • Collaborate with internal and external stakeholders when required to investigate external threats.
  • Explore open source resources and social media for threats and security-related information to identify potential risks to employees, customers, and facilities in advance of or in response to actual incidents.
  • Evaluate the changing global risk environment in real time where Palantir has interests and provide updated CI and security guidance accordingly.
What We Value
  • Strong OSINT investigative skillset
  • Hands-on experience leveraging open source monitoring tools
  • Strong written and verbal communication skills
  • Ability to present complex security and counterintelligence issues to varied audiences
  • Geographical experience or subject matter expertise outside of the US preferred
  • An active security clearance or the ability to acquire a security clearance
  • Willingness and ability to travel up to 25% of the time and work a varied schedule based on the needs of the team
What We Require
  • 5+ years experience conducting open source investigations and security analysis; formal training strongly preferred.
  • 4+ years experience in law enforcement, intelligence, or national security sectors conducting security analysis and investigations.

Salary

The estimated salary range for this position is estimated to be $80,000 - $155,000/year. Total compensation for this position may also include Restricted Stock units, sign-on bonus and other potential future incentives. Further note that total compensation for this position will be determined by each individuals relevant qualifications, work experience, skills, and other factors. This estimate excludes the value of any potential sign-on bonus; the value of any benefits offered; and the potential future value of any long-term incentives.

Benefits

  • Employees (and their eligible dependents) can enroll in medical, dental, and vision insurance as well as voluntary life insurance
  • Employees are automatically covered by Palantirs basic life, AD&D and disability insurance
  • Commuter benefits
  • Take what you need paid time off, not accrual based
  • 2 weeks paid time off built into the end of each year (subject to team and business needs)
  • 10 paid holidays throughout the calendar year
  • Supportive leave of absence program including time off for military service and medical events
  • Paid leave for new parents and subsidized back-up care for all parents
  • Fertility and family building benefits including but not limited to adoption, surrogacy, and preservation
  • Stipend to help with expenses that come with a new child
  • Employees can enroll in Palantirs 401k plan

Life at Palantir

We want every Palantirian to achieve their best outcomes, thats why we celebrate individuals strengths, skills, and interests, from your first interview to your longterm growth, rather than rely on traditional career ladders. Paying attention to the needs of our community enables us to optimize our opportunities to grow and helps ensure many pathways to success at Palantir. Promoting health and well-being across all areas of Palantirians lives is just one of the ways were investing in our community. Learn more at Life at Palantir and note that our offerings may vary by region.

If you want to empower the world's most important institutions, you belong here. Palantir values excellence regardless of background. We are proud to be an Equal Opportunity Employer for all, including but not limited to Veterans and those with disabilities. Palantir is committed to making the application and hiring process accessible to everyone and will provide a reasonable accommodation for those living with a disability. If you need an accommodation for the application or hiring process, please reach out and let us know how we can help.

#J-18808-Ljbffr
View Now

Senior Information Security Analyst - Threat Intelligence

21201 Baltimore, Maryland $100000 Annually WhatJobs

Posted today

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a highly skilled and motivated Senior Information Security Analyst to bolster their threat intelligence capabilities. This critical role is responsible for proactively identifying, analyzing, and responding to emerging cyber threats that could impact the organization. As a remote position, you will leverage cutting-edge tools and collaborative platforms to monitor the threat landscape, investigate security incidents, and develop effective mitigation strategies. Your primary responsibilities will include gathering and analyzing threat intelligence from various sources (e.g., open-source intelligence, dark web, security feeds), identifying attacker tactics, techniques, and procedures (TTPs), and producing actionable intelligence reports for security operations and leadership. You will also be involved in vulnerability assessment, penetration testing coordination, and incident response activities. The ideal candidate possesses a deep understanding of cybersecurity principles, network protocols, and common attack vectors. Experience with SIEM platforms, threat hunting techniques, and security automation is highly desirable. You will be expected to stay current with the evolving threat landscape, contribute to security awareness training, and mentor junior security analysts. Strong analytical, research, and communication skills are essential for success in this role. This is an excellent opportunity to join a forward-thinking security team and make a significant impact on the organization's security posture.

Responsibilities:
  • Monitor and analyze global threat intelligence feeds and open-source information.
  • Identify and assess emerging cyber threats, vulnerabilities, and attacker TTPs.
  • Produce timely and actionable threat intelligence reports for various stakeholders.
  • Conduct threat hunting operations to proactively detect and respond to advanced threats.
  • Support incident response activities by providing relevant threat context.
  • Perform vulnerability assessments and coordinate remediation efforts.
  • Develop and maintain security playbooks and response procedures.
  • Collaborate with security operations center (SOC) analysts to improve threat detection.
  • Stay current with the latest cybersecurity trends, tools, and techniques.
  • Contribute to security awareness initiatives and training programs.
Qualifications:
  • Bachelor's degree in Computer Science, Information Security, Cybersecurity, or a related field.
  • 5+ years of experience in information security, with a focus on threat intelligence or security analysis.
  • Strong understanding of cybersecurity frameworks, protocols, and attack vectors.
  • Experience with threat intelligence platforms, SIEM tools (e.g., Splunk, QRadar), and endpoint detection and response (EDR) solutions.
  • Proficiency in scripting languages (e.g., Python, PowerShell) for automation is a plus.
  • Excellent analytical, research, and problem-solving skills.
  • Strong written and verbal communication skills, with the ability to produce clear and concise reports.
  • Relevant security certifications such as CISSP, GIAC, or CompTIA Security+ are preferred.
  • Ability to work independently and as part of a collaborative remote team.
  • Experience in incident response or digital forensics is beneficial.
Apply Now

Senior Information Security Analyst, Threat Intelligence

27701 Durham, North Carolina $130000 Annually WhatJobs

Posted today

Job Viewed

Tap Again To Close

Job Description

full-time
Our client, a leading technology firm committed to robust cybersecurity, is seeking an experienced Senior Information Security Analyst specializing in Threat Intelligence. This critical role involves identifying, analyzing, and mitigating advanced cyber threats to protect the organization's digital assets and sensitive data. You will be responsible for developing and executing threat intelligence strategies, monitoring the global threat landscape, and providing actionable insights to the security operations center (SOC) and incident response teams. Your duties will include collecting and analyzing threat data from various sources, such as open-source intelligence (OSINT), dark web monitoring, and threat feeds. You will develop and maintain threat models, identify emerging attack vectors, and assess the potential impact on the organization. Creating detailed threat intelligence reports, briefings, and presentations for technical and executive audiences will be a core responsibility. You will also contribute to the development and refinement of security policies, procedures, and controls based on threat intelligence findings. Experience with security information and event management (SIEM) systems, intrusion detection/prevention systems (IDPS), and endpoint detection and response (EDR) solutions is essential. You will collaborate with incident response teams to provide context and support during security incidents. Staying current with the latest cybersecurity threats, vulnerabilities, and mitigation techniques is paramount. The ability to perform forensic analysis of security incidents and contribute to root cause analysis is highly valued. This position requires strong analytical, critical thinking, and problem-solving skills, combined with excellent communication abilities. This is a fully remote position, offering flexibility to work from anywhere in the US.

Key Responsibilities:
  • Monitor the global threat landscape for emerging cyber threats and vulnerabilities.
  • Collect, analyze, and correlate threat intelligence data from diverse sources.
  • Develop and maintain threat models and intelligence reports.
  • Provide actionable threat intelligence insights to security operations and incident response teams.
  • Assess the potential impact of threats on the organization and recommend mitigation strategies.
  • Contribute to the development and improvement of security policies and procedures.
  • Support incident response activities with timely and relevant threat intelligence.
  • Conduct forensic analysis of security incidents and assist in root cause determination.
  • Stay abreast of the latest cybersecurity trends, tools, and techniques.
  • Develop and maintain relationships with external threat intelligence communities and information sharing groups.
Qualifications:
  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
  • Minimum of 5 years of experience in information security, with a specialization in threat intelligence or cybersecurity analysis.
  • Proven experience in collecting, analyzing, and reporting on threat intelligence.
  • Strong understanding of cyber threat actors, tactics, techniques, and procedures (TTPs).
  • Proficiency with SIEM, IDPS, EDR, and other security monitoring tools.
  • Experience with OSINT gathering and analysis.
  • Excellent analytical, problem-solving, and critical thinking skills.
  • Strong written and verbal communication skills, with the ability to present complex information clearly.
  • Relevant certifications such as CISSP, GIAC GCTI, or equivalent are a plus.
Apply Now
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybersecurity Specialists Jobs