150 Cybersecurity jobs in Seattle
Senior Cybersecurity Analyst - Threat Intelligence
Posted 2 days ago
Job Viewed
Job Description
- Developing and implementing strategies for collecting, analyzing, and disseminating threat intelligence.
- Monitoring and analyzing global threat landscapes, identifying emerging threats, and assessing their potential impact.
- Investigating advanced persistent threats (APTs) and sophisticated cyber-attacks.
- Developing and executing threat hunting campaigns based on intelligence insights.
- Creating and tuning detection rules for SIEM, EDR, and other security monitoring tools.
- Producing regular threat intelligence reports for technical and executive audiences.
- Collaborating with incident response teams to provide context and support during security investigations.
- Building and maintaining relationships with external threat intelligence communities and vendors.
- Evaluating and recommending new threat intelligence tools and platforms.
- Developing and mentoring junior analysts on threat intelligence methodologies.
- Contributing to the improvement of the overall security posture based on intelligence findings.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, or a related field; Master's degree preferred.
- 7+ years of experience in cybersecurity, with a focus on threat intelligence, security operations, or incident response.
- Proven experience with threat intelligence platforms (TIPs), SIEMs, and EDR solutions.
- Deep understanding of attacker TTPs, malware analysis, and forensics.
- Strong knowledge of various threat intelligence frameworks (e.g., MITRE ATT&CK).
- Excellent analytical, research, and problem-solving skills.
- Proficiency in scripting languages (e.g., Python) for automation is a plus.
- Strong written and verbal communication skills, with the ability to present complex information clearly.
- Relevant certifications (e.g., GIAC Certified Intelligence Analyst - GCIA, CompTIA Advanced Security Practitioner - CASP+) are highly desirable.
- Ability to work independently and collaboratively in a fully remote environment.
Senior Cybersecurity Analyst - Threat Intelligence
Posted 2 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor and analyze threat intelligence feeds, security alerts, and open-source information to identify potential threats and vulnerabilities.
- Research and track threat actors, their tactics, techniques, and procedures (TTPs), and motivations.
- Develop and maintain threat intelligence reports, dashboards, and presentations for various stakeholders, including technical teams and executive leadership.
- Collaborate with incident response teams to provide context and support during security investigations.
- Identify indicators of compromise (IOCs) and develop detection rules for security monitoring systems (SIEM, IDS/IPS).
- Contribute to the development and refinement of the organization's threat hunting methodologies.
- Evaluate and recommend new threat intelligence tools and technologies.
- Build relationships with external threat intelligence communities and information-sharing groups.
- Provide expertise on emerging threats and advise on security control improvements.
- Document threat intelligence processes, methodologies, and findings.
- Participate in tabletop exercises and simulations to test incident response capabilities.
- Stay current with the latest cybersecurity threats, trends, and defensive strategies.
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 5 years of experience in cybersecurity, with a focus on threat intelligence, incident response, or security operations.
- Proven experience in analyzing threat actor TTPs and developing actionable intelligence.
- Strong understanding of malware analysis, network security, and host-based security.
- Proficiency with SIEM platforms, IDS/IPS, endpoint detection and response (EDR) solutions, and threat intelligence platforms (TIPs).
- Experience with scripting languages (e.g., Python, PowerShell) for automation and data analysis is highly desirable.
- Familiarity with various threat intelligence frameworks (e.g., MITRE ATT&CK).
- Excellent analytical, research, and problem-solving skills.
- Strong written and verbal communication skills, with the ability to present complex information clearly.
- Ability to work independently and as part of a collaborative team in a fast-paced environment.
- Relevant certifications such as GIAC Certified Incident Handler (GCIH), GIAC Certified Threat Intelligence (GCTI), or CISSP are a plus.
Senior Information Security Analyst (Threat Intelligence)
Posted 2 days ago
Job Viewed
Job Description
Responsibilities:
- Collect, analyze, and disseminate actionable threat intelligence.
- Monitor global threat landscape and identify emerging cyber threats.
- Develop and maintain threat intelligence feeds and indicators of compromise (IOCs).
- Conduct in-depth investigations into potential security incidents and breaches.
- Correlate threat data from multiple sources to identify attack patterns.
- Produce timely and accurate threat assessment reports for various audiences.
- Collaborate with Security Operations Center (SOC) and incident response teams.
- Provide expertise on threat actor TTPs and defensive strategies.
- Contribute to the development and improvement of security tools and processes.
- Stay abreast of the latest cybersecurity trends, vulnerabilities, and threats.
- Bachelor's degree in Computer Science, Cybersecurity, or a related field.
- 5+ years of experience in information security, with a specialization in threat intelligence.
- Proven experience with threat intelligence platforms and tools.
- Strong understanding of threat actor methodologies, malware, and attack vectors.
- Proficiency in SIEM tools and log analysis.
- Excellent analytical, research, and problem-solving skills.
- Strong written and verbal communication skills, with the ability to present technical information clearly.
- Relevant certifications (CISSP, GIAC, CISM) are highly desirable.
- Ability to work independently and collaboratively in a fast-paced environment.
Cybersecurity Administrator
Posted 1 day ago
Job Viewed
Job Description
Location : Bremerton
Job Type: Full-Time
Job Number:
Department: Service Development
Division: Service Development
Opening Date: 09/24/2025
Closing Date: 10/8/2025 4:00 PM Pacific
Summary
Under general direction of the IT Manager, administer, maintain and support all aspects of the agency's cybersecurity program to include cybersecurity compliance, policy development, budget recommendations, planning, and project management to ensure the agency's cybersecurity goals and objectives are met.
Essential Duties
Essential functions, as defined under the Americans with Disabilities Act, may include the following duties and responsibilities, knowledge, skills and other characteristics. This list of characteristic duties and responsibilities not a comprehensive listing of all functions and tasks performed by positions in this class.
Following are some highlights of the knowledge, skills and abilities required to be successful in this position.
- Cybersecurity compliance program, security protocols and policies and compliance with applicable federal, state, and local laws, rules, and regulations.
- Conceptualizing, launching, and delivering practical technology projects on time and within budget.
- Structured project methodologies and use of project planning tools.
- In-depth knowledge of Endpoints (computers, servers, storage), local and wide area network experience.
- Administering and supporting technology functions in a diverse multi-service public organization.
- Providing training and guidance to staff on information security best practices.
- Demonstrating the ability to achieve results through a flexible and open-minded approach to problem-solving, while maintaining awareness and sensitivity to interpersonal dynamics.
- Effective communication when interacting with coworkers, management, staff from other departments, the public, etc. sufficient to exchange or convey information and to receive work directions in a professional and courteous manner.
- Establishing and maintaining effective working relationships with other Kitsap Transit departments, employees and the public.
- Effective project management and prioritization skills.
- Provide high levels of results-oriented customer service and professionalism to both internal and external customers.
Associate's degree and a Certified Information Systems Security Professional (CISSP) or a CompTIA Security+ certificate is required upon entry. Five years of increasingly responsible professional experience in cybersecurity administration is required. This position also requires at least two years of increasingly responsible professional experience in Windows Server, Microsoft Office, MS SQL Server, Network Routing, Windows Active Directory and Microsoft Exchange. This position also requires the ability to provide 24/7 on-call support for IT infrastructure and communication systems.
Licenses/Certifications:
- Certified Information Systems Security Professional (CISSP) or a CompTIA Security+ certificate upon entry.
- Transportation Worker Identification Credential to be obtained within 90 days of hire.
Supplemental Information
Provide input into the development and implementation of short-term and long-term cybersecurity strategies for the agency, including the establishment of key milestones and performance metrics to track progress. Recommends and implements processes that support the agency in achieving its cybersecurity objectives. Works collaboratively with staff across departments to define and align agency-wide goals and initiatives.
Identifies cybersecurity priorities to include but not limited to, developing and implementing systems and resources to best ensure cybersecurity in both onsite and remote working environments. Reviews security provisions and infrastructure/Security Information and Event Management (SIEM) logs to ensure data security and ensures that Firewall/Security/VPN configurations are standardized and documented. Builds, maintains and deploys cybersecurity solutions to meet the agency's compliance and cybersecurity mission and goals.
Assists the IT Manager in forecasting IT resources needed to accomplish goals and objectives of the agency's cybersecurity program.
Partner with the IT Manager in creating compliance documentation and recommending security policies consistent with agency needs, federal, state and local regulations and requirements. Ensures security and data integrity by performing regimented security audits, reviews and submits any regulatory security reports as required.
Ensures appropriate backup and recovery policies and procedures are in place; conducts desktop exercises for agency continuity, disaster recovery and incident response plans. Participates in the agency's disaster recovery planning and testing. Coordinates real time data redundancy, utilizes best practices and provides overall general support of agency systems and software. Controls, maintains, monitors and approves system backup. Ensures all systems have redundancies to ensure the agency's operational continuity. With oversight of IT Manager, responsible for creating and implementing a data recovery plan and procedures so data is adequately protected in the event of a natural disaster, cyberattack, etc.
Recommends new security software and equipment, approaches, policies, and programs to effect continual improvements. Provides technical direction as necessary; recommends solutions to meet emerging cybersecurity needs; provides input into policies as needed, assists with the creation of procedures, and standards for all supported disciplines.
Performs regimented internal and external risk assessments and needs analysis. Monitors the security and data integrity of information systems is consistent with agency needs and federal, state and local requirements including but not limited to the following: Payment Card Industry (PCI) and fare collection, Health Insurance Portability and Accountability Act (HIPAA), Protected Health Information (PHI), Personally Identifiable Information (PII), International Organization for Standardization (ISO) and the use of the National Institute of Standards and Technology (NIST) Framework.
Reviews and recommends network and system recovery plans. Audits network security provisions. Responsible for maintaining data and system backups. Reviews security provisions and logs to ensure data security.
Provides input to IT Manager and Service & Capital Development Director on information technology issues; Monitors changes in local, state and federal regulations affecting information security and technology; recommends courses of action impacting the agency's information technology systems; strategies and/or projects to improve agency effectiveness.
Conducts and fosters cross-training of IT staff to encourage team development and increase the KSAs of individual team members. Supports and administers agency software applications and fulfills the agency's IT service requests through all stages of their lifecycle.
Works with other transit and government agencies in developing regional transit cybersecurity projects. Identifies recommended security products and/or services as needed to fulfill IT goals and objectives. Interacts with agency staff at all levels and vendors to resolve IT related issues, including after-hours, weekend, and remote work.
Other duties as assigned.
Generous benefits package including: Medical, Dental and Vision for employee and dependents, disability and life insurance. Kitsap Transit also participates in the WA State Public Employees' Retirement Plan (PERS) and a generous general leave accrual and 10 holidays plus 2 floating holidays.
Visit our Benefits page at
01
Do you have the legal right to work in the U.S?Note: All employment offers are contingent upon proof of eligibility to work in the U.S.
- Yes
- No
02
Do you have a valid Washington State driver's license?
- Yes
- No
03
If you have received any of the following citation(s) and/or incidents in the past three years, total the number of points associated with the citation(s). Date and type of Incident/Citation and/or Conviction.Your personal and employment driving history during the last three years will be verified by contacting the licensing departments of the state(s) where you have had a driver's license.(1 point) Accident (not at fault)(2 points) Accident (at fault)Add a point to any offense listed below if the offense occurred in a company vehicle or on company time(2 points) Operating without lights on(2 points) Carpool lane violation(2 points) Driving on the shoulder(2 points) Driving without insurance(2 points) Failure to appear(2 points) Failure to signal(2 points) Following too close(2 points) Impeding traffic (travelling too slowly)(2 points) Improper lane travel(2 points) Speeding (0-8 mph)(2 points) Suspension of license: within past 5 years(3 points) Failure to yield to emergency vehicle(3 points) Speeding (9-12 mph)(3 points) Deferred prosecution for any offense that is NOT negligent driving, reckless driving, hit and run, leaving an accident scene, driving under the influence of drugs or alcohol(3 points) Driving without a valid license(3 points) Improper child restraint(3 points) Red light camera violation(3 points) Seatbelt use violation(4 points) Cell phone use or texting violation(4 points) Deferred prosecution for negligent driving, reckless driving, hit and run, leaving an accident scene, driving under the influence of drugs or alcohol(4 points) Driving too fast for conditions(4 points) Failure to yield or stop; disobeying a road sign(4 points) Illegal passing, turning or lane change(4 points) Open alcohol container(4 points) Speeding (13 mph+ over the speed limit)(4 points) Speeding in a school zone(4 points) Violation of a bus stop paddle(6 points) Driving with suspended/revoked license(6 points) Reckless or negligent driving(6 points) Vehicular assault/homicide(6 points) DUI (DWI)(6 points) Eluding a Police Vehicle
- Total points equal 3 or less
- Total points equal 4 or more
04
Please specify which incidents/citations you have received in the last 3 years and provide the year.If you do not have any incidents or citations, please enter "n/a"
05
We are required to utilize a service to monitor employee driving record activity. Do you agree to have your driving record monitored during your employment with Kitsap Transit?
- Yes, I agree
- No, I do not agree
06
Have you been convicted of a felony within the last ten (10) years?(If yes, your application will not be considered for employment. As this position includes going to the Puget Sound Naval Shipyard, Kitsap Transit is unable to accept applications from candidates who may be disqualified under this criteria.)
- Yes
- No
07
Successful candidates must have a valid Transportation Workers Identification Credential (TWIC) ( issued by the Transportation Security Administration (TSA) within 90 days of hire. Are you willing and able to obtain and maintain this credential during the length of your employment in this position?
- Yes
- No
08
Kitsap Transit has various non-revenue vehicles that are available to all staff for agency business. In order to limit liability, we are required to utilize a service to monitor employee driving record activity. Do you agree to have your driving records monitored during your employment with Kitsap Transit?
- Yes
- No
09
Do you have an Associate's degree and a Certified Information Systems Security Professional )CISSP) or a Comp TIA Security+ certification is required upon entry.
- Yes
- No
10
Do you have a current Certified Information Systems Security Professional certificate or a Certified Cloud Security Professional (CCSP)? Please note that this is a required certification for this position. You will need to upload a copy of a current CISSP certificate for your application to be considered.
- Yes
- No
11
Regarding Procurement of Information for Employment PurposesImportant: Please read carefully before signingA consumer report and/or investigator consumer report - which may include information concerning your character, employment history, general reputation, personal characteristics, police record, education, qualifications, motor vehicle record, mode of living and/or credit and indebtedness - may be obtained for employment purposes in connection with your application for and/or continued employment with Kitsap Transit.Under federal Fair Credit Reporting Act, the term "employment purposes" when used in connection with a consumer report means "a report used for the purpose of evaluating a consumer for employment, promotion, reassignment or retention as an employee." 15 U.S.C. §1681a(f).Before any adverse action is taken, based in whole or in part on the information contained in the consumer report and/or investigative consumer report, you will be provided a copy of the report, the name, address and telephone number of the reporting agency, and a summary of your rights under the Fair Credit Reporting Act.I authorize Kitsap Transit to obtain a consumer report and/or investigative consumer report to be used for employment purposes. This authorization shall remain in effect over the course of my employment. I agree that a copy of this authorization has the same effect as the original.
- I agree to authorize Kitsap Transit to obtain a consumer report and/or investigative consumer report to be used for employment purposes.
- I do not agree to authorize Kitsap Transit to obtain a consumer report and/or investigative consumer report to be used for employment purposes.
12
All statements submitted in response to these questions set forth above are subject to investigation and verification prior to appointment. Kitsap Transit may verify any conviction record or offenses against persons, adjudications of child abuse in civil actions, and disciplinary board final decisions.We may verify your record of criminal convictions for offenses against persons, civil adjudications of child abuse, and disciplinary board final decisions.YOUR EMPLOYMENT IS EXPRESSLY CONDITIONED ON OUR RECEIPT OF A SATISFACTORY REPORT.I, the undersigned, have received a copy of this disclosure statement and do hereby certify, under penalty of perjury, that my responses to the questions set forth above are true, correct and complete.I understand and agree that if I am hired, I can be discharged for any misrepresentation or omission to the above questions. Further, I understand and agree that if I am hired, my employment is specifically conditioned on Kitsap Transit's receipt of a satisfactory report.
- Yes, I understand
- No
Required Question
Senior Threat Intelligence Analyst
Posted 1 day ago
Job Viewed
Job Description
Responsibilities:
- Monitor, analyze, and interpret threat intelligence data from various sources, including open-source intelligence (OSINT), technical intelligence, and commercial feeds.
- Identify, track, and report on Advanced Persistent Threats (APTs), malware campaigns, and cybercriminal activities relevant to the organization and its industry.
- Develop and maintain threat actor profiles, including their tactics, techniques, and procedures (TTPs).
- Produce timely and actionable threat intelligence reports, briefings, and alerts for technical and executive stakeholders.
- Collaborate with security operations center (SOC) analysts, incident responders, and security engineers to integrate threat intelligence into defense mechanisms and incident response processes.
- Develop and implement methodologies for threat hunting and proactive detection of malicious activities.
- Contribute to the development and enhancement of threat intelligence platforms and tools.
- Conduct in-depth research on emerging threats, vulnerabilities, and attack vectors.
- Provide expert guidance and recommendations on security controls and mitigation strategies based on threat intelligence.
- Participate in industry forums and information sharing groups to gather and disseminate threat intelligence.
- Mentor junior analysts and contribute to the overall growth of the threat intelligence program.
- Stay current with the latest cybersecurity trends, technologies, and attack methodologies.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field; Master's degree preferred.
- 5+ years of experience in cybersecurity, with a strong focus on threat intelligence analysis, incident response, or security operations.
- Demonstrated experience in collecting, analyzing, and disseminating threat intelligence.
- Proficiency in using threat intelligence platforms (e.g., Recorded Future, Anomali, ThreatConnect) and security information and event management (SIEM) systems.
- Strong understanding of various attack vectors, malware types, and threat actor TTPs.
- Experience with OSINT techniques and tools.
- Knowledge of network protocols, operating systems, and common security vulnerabilities.
- Excellent written and verbal communication skills, with the ability to present complex technical information clearly and concisely.
- Relevant certifications such as GCTI, CTI, CISSP, or SANS certifications are highly desirable.
- Ability to work effectively in a fast-paced, high-pressure environment.
- Strong analytical and problem-solving skills.
- Experience with scripting languages (e.g., Python, PowerShell) for automation is a plus.
Senior Threat Intelligence Analyst
Posted 2 days ago
Job Viewed
Job Description
Responsibilities:
- Collect, analyze, and interpret threat intelligence from diverse sources.
- Develop and maintain profiles of threat actors, campaigns, and TTPs (Tactics, Techniques, and Procedures).
- Produce timely and actionable threat intelligence reports for various stakeholders.
- Collaborate with Security Operations Center (SOC) and Incident Response teams.
- Conduct threat hunting exercises based on intelligence findings.
- Develop and refine threat intelligence collection requirements and methodologies.
- Utilize threat intelligence platforms and tools effectively.
- Provide expert guidance on emerging threats and their potential impact.
- Bachelor's degree in Computer Science, Cybersecurity, or a related field; Master's degree preferred.
- 7+ years of experience in cybersecurity, with a focus on threat intelligence or analysis.
- Proven experience with OSINT, dark web monitoring, and IOC analysis.
- Strong understanding of malware analysis, reverse engineering, and digital forensics.
- Proficiency in scripting languages such as Python for automation.
- Excellent written and verbal communication skills, with the ability to present complex findings.
- Experience with threat intelligence platforms (TIPs) and security information and event management (SIEM) systems.
Senior Threat Intelligence Analyst
Posted 2 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor, collect, and analyze threat intelligence from various sources, including open-source intelligence (OSINT), dark web, commercial feeds, and internal telemetry.
- Identify and track threat actors, their tactics, techniques, and procedures (TTPs), motivations, and targets.
- Develop and maintain high-fidelity threat intelligence reports, briefings, and alerts for both technical and executive audiences.
- Conduct in-depth analysis of malware, phishing campaigns, and other cyber threats to understand their origins and impact.
- Provide strategic and tactical threat intelligence to inform security operations, incident response, and risk management activities.
- Develop and tune threat detection rules and signatures based on intelligence findings.
- Collaborate with security operations center (SOC) analysts, incident responders, and other security teams to operationalize threat intelligence.
- Contribute to the development of intelligence requirements and collection plans.
- Mentor junior threat intelligence analysts and contribute to team growth and knowledge sharing.
- Stay current with emerging cyber threats, vulnerabilities, and security technologies.
- Bachelor's degree in Cybersecurity, Computer Science, Intelligence Studies, or a related field. Master's degree preferred.
- 6+ years of experience in cybersecurity, with a minimum of 4 years focused on threat intelligence analysis.
- Proven experience with threat intelligence platforms (TIPs) and security information and event management (SIEM) systems.
- Strong understanding of threat actor methodologies, APT groups, and cyber-attack lifecycles.
- Proficiency in using OSINT tools and techniques for research and analysis.
- Experience with malware analysis or reverse engineering is a strong plus.
- Excellent analytical, critical thinking, and problem-solving skills.
- Exceptional written and verbal communication skills, with the ability to clearly articulate complex technical information.
- Ability to work independently and collaboratively in a fully remote environment.
- Relevant certifications such as GIAC Certified Intelligence Analyst (GCIA), GCTI, or relevant industry experience.
Be The First To Know
About the latest Cybersecurity Jobs in Seattle !
Senior Threat Intelligence Analyst
Posted 2 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor, collect, and analyze threat intelligence data from diverse sources, including open-source intelligence (OSINT), dark web forums, technical feeds, and proprietary tools.
- Identify, track, and assess emerging cyber threats, threat actors, and their tactics, techniques, and procedures (TTPs).
- Develop comprehensive threat reports, intelligence briefs, and executive summaries for various audiences, including technical teams and senior leadership.
- Conduct deep-dive investigations into sophisticated cyber threats, including malware analysis, network intrusion analysis, and attribution efforts.
- Provide timely and actionable intelligence to incident response, security operations, and risk management teams.
- Develop and maintain relationships with external threat intelligence sharing communities and law enforcement agencies.
- Create and manage indicators of compromise (IOCs) and integrate them into security tools and platforms.
- Contribute to the continuous improvement of threat intelligence methodologies, processes, and tooling.
- Participate in tabletop exercises and simulations to test and refine defensive strategies.
- Mentor junior analysts and contribute to the growth of the threat intelligence function.
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field. Advanced degree or relevant certifications (e.g., GIAC, CISSP) are highly desirable.
- 5-7 years of experience in cybersecurity, with a minimum of 3 years focused on threat intelligence analysis.
- Proven experience in analyzing and reporting on APT campaigns, malware families, and vulnerability exploits.
- Strong understanding of networking protocols, operating systems, and common attack vectors.
- Proficiency with threat intelligence platforms (TIPs), SIEM systems, and various analytical tools.
- Excellent research, analytical, and critical thinking skills.
- Ability to communicate complex technical information clearly and concisely, both written and verbally.
- Experience with scripting languages (e.g., Python) for automation and data analysis is a plus.
- Familiarity with geopolitical factors influencing cyber threats.
- Ability to work effectively both independently and as part of a collaborative team in a hybrid work environment.
This hybrid position offers a competitive compensation package, comprehensive benefits, and the chance to work at the forefront of cybersecurity innovation in **Seattle, Washington, US**. Contribute to safeguarding critical digital assets and making a real impact.
Senior Threat Intelligence Analyst
Posted 2 days ago
Job Viewed
Job Description
Responsibilities:
- Collect, analyze, and interpret threat intelligence data from various open-source, commercial, and proprietary feeds.
- Identify, track, and report on emerging cyber threats, vulnerabilities, and malicious actor campaigns.
- Develop and disseminate actionable threat intelligence reports, briefings, and alerts to relevant teams.
- Research and analyze attacker TTPs to enhance defensive strategies and incident response capabilities.
- Utilize threat intelligence platforms (TIPs) and security information and event management (SIEM) systems for data correlation and analysis.
- Contribute to the development and refinement of threat hunting methodologies.
- Provide expert guidance and support to security operations centers (SOCs) and incident response teams.
- Stay abreast of the latest cybersecurity trends, threats, and mitigation techniques.
- Build and maintain relationships with external threat intelligence communities and information-sharing organizations.
- Develop and present threat landscape assessments to internal stakeholders and executive leadership.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field. Master's degree preferred.
- Minimum of 5-7 years of experience in cybersecurity, with a focus on threat intelligence analysis.
- Demonstrated expertise in analyzing malware, network traffic, and forensic data.
- Strong understanding of the global threat landscape, attack methodologies, and cybersecurity frameworks.
- Proficiency with threat intelligence platforms (TIPs), SIEM tools, and relevant analytical tools.
- Excellent research, analytical, and problem-solving skills.
- Strong written and verbal communication skills, with the ability to explain complex technical concepts.
- Ability to work independently and collaboratively in a remote, fast-paced environment.
- Relevant certifications such as CISSP, GIAC, or similar are highly desirable.
Senior Threat Intelligence Analyst
Posted 2 days ago
Job Viewed
Job Description
Responsibilities:
- Collect, analyze, and interpret data from various sources to identify and track cyber threats relevant to the organization and its clients.
- Develop actionable threat intelligence reports, including adversary profiles, campaign analysis, and vulnerability assessments.
- Monitor the dark web, social media, and other open-source intelligence (OSINT) channels for relevant threat information.
- Analyze malware samples and attack vectors to understand threat actor methodologies.
- Develop and refine threat hunting strategies and methodologies.
- Collaborate with incident response and security operations teams to provide context and support during security events.
- Create and maintain threat intelligence feeds and indicators of compromise (IOCs).
- Develop and deliver presentations on threat intelligence findings to technical and executive audiences.
- Stay current with the latest cybersecurity threats, vulnerabilities, and geopolitical events influencing the threat landscape.
- Mentor junior analysts and contribute to the development of intelligence methodologies.
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- 5+ years of experience in cybersecurity, with a significant focus on threat intelligence analysis.
- Demonstrated expertise in analyzing threat actor TTPs, motivations, and capabilities.
- Proficiency with threat intelligence platforms, SIEM tools, and data analysis tools.
- Strong understanding of networking protocols, operating systems, and common attack vectors.
- Experience with OSINT techniques and tools.
- Excellent written and verbal communication skills, with the ability to articulate complex technical information clearly.
- Ability to work independently and collaboratively in a remote, fast-paced environment.
- Relevant certifications (e.g., GCTI, CASP+) are a strong plus.
- Knowledge of scripting languages (e.g., Python) for automation is beneficial.