1354 Cybersecurity jobs in Fairfax

Cybersecurity Threat Intelligence Analyst - Senior

20022 Washington, District Of Columbia ECS Limited

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

ECS is seeking a Sr. Cybersecurity Threat Intelligence Analyst to work in our Washington, DC office.

  • Responsible for development and leadership of the CTI team establishment of the mission, maturity, optimizing, task management, and maintenance of threat intelligence processes and documentation.
  • Identify threat tactics, methodologies, gaps, and shortfalls.
  • Provide subject matter expertise to the development of cyber operations specific indicators.
  • Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.
  • Assist in the identification of intelligence collection shortfalls.
  • Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets
  • Monitor open-source websites for hostile content directed towards organizational or partner interests.
  • Monitor operational environment and report on adversarial activities which fulfill leadership's priority information requirements.
  • Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
  • Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations.
  • Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations.
  • Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities.
  • Report intelligence-derived significant network events and intrusions.
  • Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up to date.
Salary Range: $107,000 - $120,100

General Description of Benefits
  • 7+ years of experience in identifying potential and real threats to computing infrastructure and data and providing risk mitigation strategies and recommendations.
  • Review prioritized intelligence requirements (PIR) for additions, deletions, and changes in priority.
  • Ensure alignment with decision made by USCB leadership on program objectives, scope, and escalation criteria.
  • Research, analyze, and disseminate classified cyber threat briefings, reports, and information in accordance with all relevant controls for handling and disseminating classified information.
  • Strong written and verbal communication skills.
  • Experience using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches.
  • Experience using multiple analytic tools, databases, and techniques (e.g., Analyst's Notebook, Maltego, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.).
  • Ability to communicate and brief complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
  • Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
  • Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
  • Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
  • Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
  • Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes.
  • Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
  • Bachelor's degree or equivalent work experience.
  • 7+ years' cyber threat intelligence experience focused on Cyber operations fundamentals, operational intelligence analysis, and reporting.
  • Certifications addressing advanced IDS concepts, applications protocols, concepts of TCP/IP and the link layer, DNS, fragmentation, IDS fundamentals and initial deployment, IDS rules, IPv6, network architecture and event correlation, network traffic analysis and forensics, packet engineering, silk and other traffic analysis tools, TCP, Tcpdump filters, UDP and ICMP, focus on new attack vectors (emphasis on cloud computing technology, mobile platforms and tablet computers), new vulnerabilities, existing threats to operating environments, information systems audit process, IT governance and management.
  • Active TS/SCI clearance.
View Now

Senior Cybersecurity Threat Intelligence Analyst

20001 Washington, District Of Columbia $125000 Annually WhatJobs

Posted 13 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is looking for a highly skilled and proactive Senior Cybersecurity Threat Intelligence Analyst to join their elite security operations team in Washington, D.C., US . This position plays a crucial role in safeguarding the organization's digital assets by identifying, analyzing, and disseminating actionable threat intelligence. The Senior Analyst will be responsible for monitoring global threat landscapes, tracking advanced persistent threats (APTs), and developing proactive defense strategies. Key responsibilities include conducting in-depth research on emerging cyber threats, vulnerabilities, and attacker tactics, techniques, and procedures (TTPs). You will analyze threat data from various sources, including open-source intelligence (OSINT), technical indicators, and proprietary feeds, to produce comprehensive threat intelligence reports. The role involves collaborating with incident response teams, security engineering, and IT operations to integrate intelligence into defensive measures. You will also be responsible for developing and maintaining threat models, conducting vulnerability assessments, and providing strategic guidance on cybersecurity best practices. A Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field is required; a Master's degree is preferred. A minimum of 7 years of experience in cybersecurity, with at least 4 years focused on threat intelligence, incident response, or security operations, is essential. Deep understanding of various threat actor groups, malware analysis, network security, and common attack vectors is mandatory. Certifications such as CISSP, GIAC, or CEH are highly valued. Excellent analytical, critical thinking, and communication skills are necessary to effectively convey complex technical information. Join our team and help us stay ahead of evolving cyber threats.
Apply Now

Associate Cybersecurity Analyst - Network Security

22011 Ashburn, Virginia Visa

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Company Description

Visa is a world leader in payments and technology, with over 259 billion payments transactions flowing safely between consumers, merchants, financial institutions, and government entities in more than 200 countries and territories each year. Our mission is to connect the world through the most innovative, convenient, reliable, and secure payments network, enabling individuals, businesses, and economies to thrive while driven by a common purpose - to uplift everyone, everywhere by being the best way to pay and be paid.

Make an impact with a purpose-driven industry leader. Join us today and experience Life at Visa.

Job Description

The Cybersecurity Operations Associate Analyst is primarily responsible to monitor, analyze, and resolve onprem and cloud network security devices, security tools, and systems issues. This position will manage technical support requests directly from users as well as prioritize escalations from other team members and field engineers. Our engineers are responsible for maintaining application uptime and improving their computing experiences through effective maintenance, problem identification and resolution activities.

The position requires an in-depth understanding of how logical and physical connectivity issues can affect network and systems security posture and transaction quality.

Essential Functions:

* Monitor, analyze, and resolve network/cloud security devices, systems, and tools incidents

* Troubleshoot issues stemming from configurations on platforms such as firewalls including web application firewalls, proxies, distributed denial of service systems, data labeling and loss systems, and host-based security controls

* Follow both work instruction playbooks and runbook automations activities. Provide feedback to modify and suggest changes to work instructions for similar impacting events

* Understand and work within established Service Level Agreements (SLA) to ensure timely response

* Support and promote Visa's Cybersecurity operation standards and excellence

* Continuous improvement of core functions expected from Cybersecurity Operations Center

* Track, update, and resolve all assigned incidents, changes, and problem reports in the incident management system, ensuring that documentation is thorough, accurate, and meets a standard of high quality

* Follow documented support procedures, managing each issue through resolution or turnover to maintain established service levels

* Solicit feedback of documented procedures to accurately record resolution and ensure client satisfaction

* Measure and review work instructions for accuracy of execution and to drive toward objective response and restoration time frames. Review and solicit improvements through second level support groups and peers

* Maintain and achieve new technical skills through in-house or external trainings by engineering or higher-level support teams

* Modify and create work instructions or Recipes to prepare for similar impacting events and allow for a quicker response. Constantly review work instructions for accuracy and ask for improvements through second level support groups

* Lead, support, or contribute based on various incident bridges stewardship in support of timely resolution of internal issues

* Proactively monitor, recognize, analyze, isolate and/or resolve documented hardware and software problems utilizing a variety of hardware and software testing techniques

* Articulate problem statements with clarity. Consult with L2 support groups or development teams to drive toward long-term restoration and resolution of incidents

* Responsible for the internal and external communication of issues to management, other internal support groups, customer pages, email broadcasts, or verified phone calls

This is a hybrid position. Expectation of days in office will be confirmed by your Hiring Manager.

Qualifications

* Basic Qualifications :

Bachelor's degree, OR 3+ years of relevant work experience

Preferred Qualifications :

* Bachelor's degree, OR 3+ years of relevant work experience

* Work experience or training as a Network/Security Operations Engineer, network/security support analyst, or experience across multiple technologies such as firewalls including web application firewall, proxies, distributed denial of service systems, data labeling and loss systems

* Understanding of network monitoring concepts and management tools. Knowledge of systems, application, and fault monitoring toolsets namely Indeni, Splunk, QRadar, Solarwinds, or other similar platforms

* Functional understanding of packet and protocol from firewall and other systems through tools such as Wireshark to support troubleshooting activities

* Demonstrate knowledge of native cloud-based security monitoring tools

* General knowledge of networking and routing topology, cybersecurity frameworks, constructs, and auditable standards

* Communicate effectively throughout the incident management process to ensure that all communications are timely and accurate, as per documented process

* Understanding, proficiency, or certification of Information Technology Infrastructure Library (ITIL) concepts, preferably with knowledge of ServiceNow or other incident and change management tools

* Possess the background, experience, or skills to maintain both central and distributed firewall platforms and logging infrastructures

* MS Office suite functional use

Additional Information

Work Hours: Varies upon the needs of the department.

Travel Requirements: This position requires travel5-10% of the time.

Mental/Physical Requirements: This position will be performed in an office setting. The position will require the incumbent to sit and stand at a desk, communicate in person and by telephone, frequently operate standard office equipment, such as telephones and computers.

Visa is an EEO Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. Visa will also consider for employment qualified applicants with criminal histories in a manner consistent with EEOC guidelines and applicable local law.

Visa will consider for employment qualified applicants with criminal histories in a manner consistent with applicable local law, including the requirements of Article 49 of the San Francisco Police Code.

U.S. APPLICANTS ONLY: The estimated salary range for a new hire into this position is 84,600.00 to 119,650.00 USD per year, which may include potential sales incentive payments (if applicable). Salary may vary depending on job-related factors which may include knowledge, skills, experience, and location. In addition, this position may be eligible for bonus and equity. Visa has a comprehensive benefits package for which this position may be eligible that includes Medical, Dental, Vision, 401 (k), FSA/HSA, Life Insurance, Paid Time Off, and Wellness Program.

View Now

Threat Intelligence Engineer

20022 Washington, District Of Columbia Coinbase

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Ready to be pushed beyond what you think you’re capable of?

At Coinbase, our mission is to increase economic freedom in the world. It’s a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform — and with it, the future global financial system.

To achieve our mission, we’re seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company’s hardest problems.

Our work culture is intense and isn’t for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there’s no better place to be.

While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.

Security is a primary competency at Coinbase, and the Threat Intelligence team within Security Operations keeps a watchful eye over every aspect of it. Every day, we go to battle against some of the most sophisticated attackers in the world to protect billions of dollars worth of digital assets and ensure that our customers and employees can enjoy a safe, trusted experience. As Coinbase scales globally, our team is scaling along with it, using a blend of tooling, automation, and strategic team growth to ensure that we’re well-equipped to protect the next billion users of crypto.

Join our dynamic threat intelligence team at Coinbase to enhance our threat intelligence platform. Your work will directly support our mission of securing crypto assets by developing capabilities within Vertex Synapse to address the evolving needs of our stakeholders and enhance the efficacy of our threat detection and response.

What you’ll be doing (ie. job duties):

  • Develop and integrate external and internal enrichments and power-ups with Vertex Synapse

  • Collect and support stakeholder intelligence needs through tool development within Vertex Synapse to satisfy collection management requirements

  • Quickly create and fine-tune tools to improve security operations processes and ensure the tools integrate into data processing pipelines

  • Enhance the efficiency of processes within Vertex Synapse related to the collection, analysis, storage, tagging, and enrichment of indicators of compromise (IoCs) and associated data to improve the detection and mitigation of cyber threats

  • Work closely with security operations teams to align on collection requirements and translate operational requirements into technical specifications

What we look for in you (ie. job requirements):

  • 3+ years of experience developing enrichments, automations, and tagging in threat intelligence platforms, specifically Vertex Synapse

  • Technical proficiency in software development, including demonstrable experience in creating and maintaining security tools

  • Exceptional analytical skills to dissect complex problems and synthesize actionable insights, supported by an ability to discover opportunities for unique data correlations

  • Ability to rapidly prototype and iterate tool development to adapt to evolving threat intelligence needs

  • Experience managing security telemetry data

  • Excellent communication skills and a collaborative mindset to work efficiently with cross-functional teams

Job #: P70662

Pay Transparency Notice: Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include target bonus + target equity + benefits (including medical, dental, vision and 401(k)).

Pay Range:

$144,500—$170,000 USD

Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.

Commitment to Equal Opportunity

Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the Employee Rights and the Know Your Rights notices by clicking on their corresponding links. Additionally, Coinbase participates in the E-Verify program in certain locations, as required by law.

Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations(at)coinbase.com to let us know the nature of your request and your contact information. For quick access to screen reading technology compatible with this site click here to download a free compatible screen reader (free step by step tutorial can be found here).

Global Data Privacy Notice for Job Candidates and Applicants

Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available here. By submitting your application, you are agreeing to our use and processing of your data as required. For US applicants only, by submitting your application you are agreeing to arbitration of disputes as outlined here.

AI Disclosure

For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.

For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.

The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment . To request a reasonable accommodation due to disability, please contact accommodations(at)coinbase.com

View Now

Threat Intelligence Engineer

20080 Washington, District Of Columbia Coinbase

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

Ready to be pushed beyond what you think you're capable of?
At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
Security is a primary competency at Coinbase, and the Threat Intelligence team within Security Operations keeps a watchful eye over every aspect of it. Every day, we go to battle against some of the most sophisticated attackers in the world to protect billions of dollars worth of digital assets and ensure that our customers and employees can enjoy a safe, trusted experience. As Coinbase scales globally, our team is scaling along with it, using a blend of tooling, automation, and strategic team growth to ensure that we're well-equipped to protect the next billion users of crypto.
Join our dynamic threat intelligence team at Coinbase to enhance our threat intelligence platform. Your work will directly support our mission of securing crypto assets by developing capabilities within Vertex Synapse to address the evolving needs of our stakeholders and enhance the efficacy of our threat detection and response.
*What you'll be doing (ie. job duties):*
* Develop and integrate external and internal enrichments and power-ups with Vertex Synapse
* Collect and support stakeholder intelligence needs through tool development within Vertex Synapse to satisfy collection management requirements
* Quickly create and fine-tune tools to improve security operations processes and ensure the tools integrate into data processing pipelines
* Enhance the efficiency of processes within Vertex Synapse related to the collection, analysis, storage, tagging, and enrichment of indicators of compromise (IoCs) and associated data to improve the detection and mitigation of cyber threats
* Work closely with security operations teams to align on collection requirements and translate operational requirements into technical specifications
*What we look for in you (ie. job requirements):*
* 3+ years of experience developing enrichments, automations, and tagging in threat intelligence platforms, specifically Vertex Synapse
* Technical proficiency in software development, including demonstrable experience in creating and maintaining security tools
* Exceptional analytical skills to dissect complex problems and synthesize actionable insights, supported by an ability to discover opportunities for unique data correlations
* Ability to rapidly prototype and iterate tool development to adapt to evolving threat intelligence needs
* Experience managing security telemetry data
* Excellent communication skills and a collaborative mindset to work efficiently with cross-functional teams
Job #: P70662
*Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include target bonus + target equity + benefits (including medical, dental, vision and 401(k)).
Pay Range:
$144,500-$170,000 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations Data Privacy Notice for Job Candidates and Applicants
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available Disclosure
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations(at)coinbase.com
View Now

Senior Information Security Analyst - Threat Intelligence

20001 Washington, District Of Columbia $130000 Annually WhatJobs

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client, a leader in cybersecurity solutions, is seeking a highly skilled Senior Information Security Analyst specializing in Threat Intelligence to join their elite security operations team in Washington, D.C., US . This role is pivotal in protecting the organization and its clients from evolving cyber threats. The Senior Information Security Analyst will be responsible for the proactive identification, analysis, and reporting of cyber threats, vulnerabilities, and attack vectors. You will play a critical role in developing and implementing threat intelligence strategies, correlating data from various sources, and providing actionable insights to security teams and leadership. Key responsibilities include monitoring global threat landscapes, analyzing threat actor tactics, techniques, and procedures (TTPs), and contributing to incident response efforts. The ideal candidate will possess a deep understanding of cybersecurity frameworks, networking protocols, and malware analysis. Strong analytical, research, and communication skills are essential, as is experience with threat intelligence platforms and SIEM tools. You will be instrumental in enhancing the organization's defensive posture and mitigating security risks. Responsibilities:
  • Proactively monitor and analyze global threat intelligence feeds, open-source intelligence (OSINT), and industry reports to identify emerging threats and trends.
  • Analyze threat actor TTPs, motivations, and infrastructure to develop actionable intelligence.
  • Correlate and enrich security data from various sources, including SIEM, IDS/IPS, endpoint protection, and vulnerability scanners.
  • Develop and maintain threat intelligence reports, briefings, and alerts for technical and executive audiences.
  • Contribute to the development and refinement of threat hunting methodologies and use cases.
  • Support incident response activities by providing timely and accurate threat context and analysis.
  • Identify and assess vulnerabilities within the organization's environment and recommend mitigation strategies.
  • Collaborate with security operations center (SOC) analysts, incident responders, and other security teams to share intelligence and improve defensive capabilities.
  • Evaluate and recommend new threat intelligence tools and technologies.
  • Stay abreast of the latest cybersecurity threats, attack methods, and defense techniques.
  • Contribute to the development and improvement of security policies and procedures.
Qualifications:
  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field. Master's degree preferred.
  • Minimum of 5 years of experience in information security, with a strong focus on threat intelligence, security analysis, or incident response.
  • Proven experience in collecting, analyzing, and reporting on cyber threats and vulnerabilities.
  • In-depth understanding of cybersecurity principles, frameworks (e.g., MITRE ATT&CK), and common attack vectors.
  • Familiarity with threat intelligence platforms, SIEM tools (e.g., Splunk, QRadar), and endpoint detection and response (EDR) solutions.
  • Proficiency in analyzing network traffic, logs, and malware.
  • Strong research, analytical, and critical thinking skills.
  • Excellent written and verbal communication skills, with the ability to present complex information clearly.
  • Relevant certifications such as GIAC Certified Incident Handler (GCIH), GIAC Certified Intrusion Analyst (GCIA), or CISSP are highly desirable.
  • Ability to work effectively in a team-oriented environment and manage multiple priorities.
Apply Now

Senior Information Security Analyst - Threat Intelligence

20005 Washington, District Of Columbia $120000 Annually WhatJobs

Posted 13 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a highly motivated and experienced Senior Information Security Analyst specializing in Threat Intelligence to join their dynamic team in Washington, D.C., US . This role is critical in safeguarding the organization's digital assets by identifying, analyzing, and mitigating cyber threats. You will be responsible for monitoring the global threat landscape, developing actionable intelligence reports, and advising on defensive strategies. The ideal candidate will possess a deep understanding of cyberattack methodologies, threat actors, malware analysis, and security frameworks. You will collaborate closely with incident response teams, security operations center (SOC) analysts, and other stakeholders to ensure proactive defense mechanisms are in place.

Key Responsibilities:
  • Continuously monitor and analyze threat intelligence feeds, dark web forums, and open-source intelligence (OSINT) for emerging threats relevant to the organization.
  • Develop and maintain threat models, actor profiles, and attack vectors.
  • Produce high-quality, timely threat intelligence reports and briefings for technical and executive audiences.
  • Provide expert guidance on security best practices and risk mitigation strategies based on intelligence findings.
  • Support the incident response process by providing context and indicators of compromise (IOCs).
  • Evaluate and recommend new threat intelligence tools and technologies.
  • Participate in security awareness training and evangelize threat intelligence best practices across the organization.
  • Collaborate with internal teams and external partners to share information and enhance collective security posture.
  • Conduct vulnerability assessments and penetration testing support as needed.
  • Stay abreast of the latest cybersecurity trends, technologies, and vulnerabilities.
Qualifications:
  • Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field. Master's degree or relevant certifications (e.g., CISSP, GIAC, OSCP) are a plus.
  • Minimum of 5 years of experience in information security, with at least 2 years focused on threat intelligence analysis.
  • Proven experience with SIEM tools, threat intelligence platforms (TIPs), and security orchestration, automation, and response (SOAR) solutions.
  • Strong understanding of networking protocols, operating systems, and common attack vectors.
  • Excellent analytical, problem-solving, and critical-thinking skills.
  • Exceptional written and verbal communication skills, with the ability to articulate complex technical information to diverse audiences.
  • Ability to work independently and as part of a collaborative team in a fast-paced environment.
  • Proficiency in scripting languages such as Python is highly desirable.
  • Must be eligible to work in the US.
This is an exceptional opportunity to make a significant impact on the security of a leading organization. Join us and be at the forefront of cyber defense in Washington, D.C., US .
Apply Now
Be The First To Know

About the latest Cybersecurity Jobs in Fairfax !

Senior Information Security Analyst - Threat Intelligence

20001 Washington, District Of Columbia $100000 Annually WhatJobs

Posted 13 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client, a leading cybersecurity firm operating nationally and headquartered in Washington, D.C., US , is seeking a highly skilled Senior Information Security Analyst with a specialization in Threat Intelligence. This vital role involves the proactive identification, analysis, and dissemination of threat intelligence to protect the organization and its clients from cyber threats. The ideal candidate will possess deep expertise in cyber threat landscapes, advanced persistent threats (APTs), malware analysis, and security incident response. You will be responsible for monitoring global threat activities, correlating intelligence from various sources, and developing actionable insights to enhance our defensive security posture. This is an exciting opportunity to work at the forefront of cybersecurity and contribute to safeguarding critical digital assets.

Key Responsibilities:
  • Monitor, collect, and analyze global cybersecurity threat intelligence from various sources, including open-source intelligence (OSINT), dark web, threat feeds, and proprietary tools.
  • Identify and track threat actors, their tactics, techniques, and procedures (TTPs).
  • Conduct in-depth analysis of malware, phishing campaigns, and other cyberattack vectors.
  • Develop and disseminate actionable threat intelligence reports, alerts, and briefings to relevant stakeholders, including security operations centers (SOC) and incident response teams.
  • Collaborate with incident response teams to provide timely intelligence during active security incidents.
  • Develop and refine threat hunting methodologies based on intelligence gathered.
  • Contribute to the development and improvement of security tools and technologies used for threat intelligence collection and analysis.
  • Participate in security awareness training and provide subject matter expertise on current cyber threats.
  • Maintain and manage threat intelligence platforms and databases.
  • Build relationships with external threat intelligence communities and information sharing groups.
  • Stay current with emerging cybersecurity threats, vulnerabilities, and industry best practices.
  • Develop and maintain documentation for threat intelligence processes and procedures.
Qualifications:
  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field. Master's degree is a plus.
  • Minimum of 5 years of experience in information security, with at least 3 years focused on threat intelligence, security operations, or incident response.
  • Proven experience in collecting, analyzing, and reporting on cyber threat intelligence.
  • In-depth knowledge of threat actor methodologies, APTs, malware analysis, and network forensics.
  • Proficiency with threat intelligence platforms, SIEM tools, and security analytics tools.
  • Familiarity with scripting languages (e.g., Python) for data analysis and automation is highly desirable.
  • Excellent analytical, critical thinking, and problem-solving skills.
  • Strong written and verbal communication skills, with the ability to clearly articulate complex technical information.
  • Relevant certifications such as GIAC Certified Incident Handler (GCIH), GIAC Certified Intrusion Analyst (GCIA), or Certified Threat Intelligence Analyst (CTIA) are highly valued.
  • Ability to work independently and collaboratively in a team environment.
Join a world-class team dedicated to staying ahead of evolving cyber threats.
Apply Now

Senior Information Security Analyst, Threat Intelligence

20004 Washington, District Of Columbia $120000 Annually WhatJobs

Posted 17 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a highly skilled and motivated Senior Information Security Analyst to join their growing team in Washington, D.C., US . This critical role focuses on threat intelligence and the proactive defense against evolving cyber threats. The ideal candidate will have extensive experience in analyzing security threats, identifying vulnerabilities, and developing robust mitigation strategies. You will be responsible for monitoring security alerts, investigating security incidents, and conducting forensic analysis to understand the root cause of breaches. Key responsibilities include developing and implementing security policies and procedures, conducting security awareness training, and evaluating and recommending new security technologies. The Senior Information Security Analyst will also play a key role in incident response planning and execution, ensuring the organization's assets are protected against sophisticated attacks. This position requires a deep understanding of network security, endpoint security, cloud security, and various security frameworks such as NIST and ISO 27001. We are looking for an individual with a keen eye for detail, strong analytical skills, and the ability to communicate complex technical information clearly and concisely to both technical and non-technical audiences. You will be at the forefront of defending the organization against cyber adversaries, requiring a proactive and innovative approach to security. This role offers the opportunity to work with cutting-edge security tools and technologies in a challenging and rewarding environment. Collaboration with internal teams, including IT, legal, and compliance, will be essential to maintain a comprehensive security posture. The successful candidate will contribute significantly to the overall security strategy and risk management efforts.

Key Responsibilities:
  • Monitor, detect, and respond to security threats and incidents.
  • Conduct in-depth analysis of security logs, network traffic, and system events.
  • Perform vulnerability assessments and penetration testing.
  • Develop and implement security controls and countermeasures.
  • Create and maintain security documentation, policies, and procedures.
  • Lead incident response efforts and conduct post-incident analysis.
  • Stay abreast of the latest cybersecurity trends, threats, and technologies.
  • Provide security expertise and guidance to other departments.
  • Contribute to the development of security awareness training programs.
  • Evaluate and recommend security solutions and technologies.
Qualifications:
  • Bachelor's degree in Cybersecurity, Computer Science, or a related field.
  • CISSP, CISM, CEH, or similar security certifications are highly desirable.
  • Minimum of 7 years of experience in information security, with a focus on threat intelligence and incident response.
  • Strong understanding of cybersecurity principles, frameworks (NIST, ISO 27001), and best practices.
  • Proficiency in security information and event management (SIEM) tools, IDS/IPS, and endpoint detection and response (EDR) solutions.
  • Excellent analytical, problem-solving, and communication skills.
  • Experience with scripting languages (e.g., Python, PowerShell) for automation is a plus.
Apply Now

Senior Threat Intelligence Analyst

20022 Washington, District Of Columbia Clear Corporate Services LLC

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Have you ever had that green-light feeling? When you hit every green light and the day just feels like magic. CLEAR's mission is to create frictionless experiences where every day has that feeling. With more than 30+ million passionate members and hundreds of partners around the world, CLEAR's identity platform is transforming the way people live, work, and travel. Whether it's at the airport, stadium, or right on your phone, CLEAR connects you to the things that make you, you - unlocking easier, more secure, and more seamless experiences - making them all feel like magic.

CLEAR is seeking a highly experienced, strategic and hands-on Threat Intelligence Analyst III leader to elevate our existing threat intelligence program into a fully integrated, business-aligned capability. In this role, you'll fuse internal telemetry with external insights to produce high-impact, actionable intelligence for both technical teams and executive leadership.

Success means advancing our intelligence lifecycle, improving decision-making across security functions, and proactively informing detection, response, and risk strategies. Ideal candidates combine deep threat expertise with clear communication, operational rigor, and a proven ability to drive intelligence-led security outcomes.

What you'll do:

  • Mature and lead the threat intelligence program, aligning it with business and security priorities
  • Execute strategic, operational, and tactical intelligence functions across the organization
  • Fuse internal telemetry (e.g., SOC data, incident reports, vulnerability management) with external sources (e.g., open source, commercial feeds, ISACs)
  • Develop and deliver tailored intelligence products to internal stakeholders ranging from SOC analysts to executive leadership
  • Collaborate cross-functionally with incident response, vulnerability management, threat hunting, product, and risk teams
  • Represent CLEAR in external intelligence-sharing communities and contribute to industry partnerships and ecosystems
How you'll measure success:
  • Demonstrated improvements in the quality, relevance, and actionability of intelligence products
  • Reduction in incident response time due to proactive threat insights
  • Increased stakeholder engagement with threat intel outputs (e.g., briefings, reports, dashboards)
  • Establishment of measurable intelligence requirements and successful feedback loops
  • Expansion and enrichment of internal threat intelligence repositories and tooling
  • Integration of threat intelligence into security workflows (e.g., detection engineering, risk assessments, penetration testing)
What you're great at:
  • Turning vague or high-level threat signals into structured, actionable intelligence
  • Communicating complex threat landscapes in a clear, business-relevant manner to technical and non-technical audiences
  • Building and optimizing intelligence collection strategies using both internal telemetry and external partnerships
  • Prioritizing competing demands from security and business stakeholders with a threat-driven mindset
  • Managing or mentoring junior analysts and building team processes from the ground up
  • Understanding threat actor TTPs, malware analysis outputs, geopolitical drivers, and their implications on the enterprise

How You'll be Rewarded:

At CLEAR, we help YOU move forward - because when you're at your best, we're at our best. You'll work with talented team members motivated by our mission of making experiences safer and easier. Our offices are bright and energetic with an open concept and plenty of conference rooms and casual co-working spaces. We also offer catered lunches every day and have fully stocked kitchens. Outside of the office, we invest in your well-being and learning & development with stipends and reimbursement programs.

We offer holistic total rewards, including comprehensive healthcare plans, family-building benefits (fertility and adoption/surrogacy support), flexible time off, annual wellness stipend, free OneMedical memberships for you and your dependents, a CLEAR Plus membership, and a 401(k) retirement plan with employer match. The base salary range for this role is $150,000 - $175,000, depending on levels of skills and experience.

Salaries will vary depending on various factors which include, but are not limited to location, education, skills, experience and performance. The range listed is just one component of CLEAR's total compensation package for employees and other rewards may include annual bonuses, commission, Restricted Stock Units.

CLEAR provides reasonable accommodation to qualified individuals with disabilities or protected needs. Please let us know if you require a reasonable accommodation to apply for a job or perform your job. Examples of reasonable accommodation include, but are not limited to, time off, extra breaks, making a change to the application process or work procedures, policy exceptions, providing documents in an alternative format, live captioning or using a sign language interpreter, or using specialized equipment.

#LI-Onsite
View Now
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybersecurity Jobs View All Jobs in Fairfax