12,319 Cybersecurity jobs in the United States

Cybersecurity Threat Intelligence Lead

77391 Klein, Texas Woodforest National Bank

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Take the next step toward your new career today!

Become a part of the diverse and inclusive team within our nationally recognized award-winning Bank that is one of the strongest in the nation. Woodforest National Bank is privately owned, and our Employee Stock Ownership Plan is the largest shareholder. We focus on building relationships and discovering opportunities to better serve our communities and understand the financial needs of every customer we serve. At Woodforest we care and prove it by volunteering with local charities and foodbanks to give back to the communities we serve. By joining Woodforest you will become a part of one of the largest employee-owned banks in the country!

The Cybersecurity Threat Intelligence Lead will serve as the primary (or SME) on threats against the Bank’s reputation, brand, and systems through multiple threat intelligence sources. The role will be responsible for design and implementation of threat intelligence systems and will also play a significant role in threat hunting and penetration testing activities. This position will work ‘in-office’ during an initial training period. Once the training period is successfully completed, this position, at the manager’s discretion, is eligible for hybrid work schedule.

Key Responsibilities: · Works closely with internal technology teams, business stakeholders, MSSP, and outside vendors to research, analyze and monitor security threats. · Mentors other analysts responsible for threat intel, incident response, network, cloud, endpoint and database security. · Deploys and manages security solutions to assist with logging, alerting, and threat analysis. · Security system monitoring and alerting appropriate parties of vulnerabilities, attacks, and other security issues. · Recommends and implements policies and procedures to ensure adherence to security standards.

Competencies Required: · Demonstrated success in managing, analyzing, and solving complex network technical issues. · Technical knowledge of security configurations, log analysis, intrusion detection and mitigation. · Strong verbal communication and technical writing skills with an ability to effectively interact with and convey information to people who possess varying levels of understanding on applicable topics. · Ability to work independently while supporting a team environment. · Solid understanding of network security practices, systems, and standards. · Strong technology skills, including intermediate proficiency with Microsoft Office (Word, Excel, Outlook, PowerPoint, Visio) SIEM and EDR platforms. · Customer service orientation with proven process and project management skills. · Strategic and problem-solving mindset with developed analytical abilities and organizational skills.

Minimum Qualifications/Experience: · 5 years’ network or systems administration experience required. · 2 years’ EDR management experience required. · 1 years’ SIEM management experience required. · Other beneficial experience, (i.e., VA, IPS, Cloud Security, Routing and Switching, Vulnerability Management, Threat Reputation/Intel Solution, CASB, Python, or Automation/Orchestration), preferred. · Financial services or banking industry experience preferred.

Formal Education & Certification: · IT related degree preferred.

Work Status: · Full-Time.

Supervisory Responsibility: · None.

Travel: · Less than 10% travel expected.

Working Conditions: · Conditions involve lifting no more than ten pounds, sitting most of the time, but may involve walking, moving, or standing for brief periods, and occasionally lifting and carrying articles like files, ledgers, folders, etc.

Disclaimer: This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Nothing herein restricts management’s right to assign or reassign duties and responsibilities to this job at any time.

Woodforest is an Equal Opportunity Employer, including Disability and Veterans.

Job: *Technology Services

Organization: *Texas - Houston

Title: Cybersecurity Threat Intelligence Lead

Location: Texas-The Woodlands

Requisition ID:

View Now

Cybersecurity Analyst - Threat Intelligence

23451 Virginia Beach, Virginia $105000 Annually WhatJobs

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is looking for a highly skilled and vigilant Cybersecurity Analyst specializing in Threat Intelligence to join their cutting-edge security team. This role is critical for identifying, analyzing, and mitigating cyber threats to protect our client's digital assets and infrastructure. You will be responsible for proactively monitoring global threat landscapes, collecting and analyzing threat data from various sources, and developing actionable intelligence to inform defensive strategies. The ideal candidate possesses a deep understanding of cybersecurity principles, attack vectors, threat actor tactics, techniques, and procedures (TTPs), and current cybersecurity trends. You will leverage advanced tools and techniques to detect emerging threats, assess their potential impact, and provide timely recommendations for containment and eradication. This position requires a meticulous approach to research, data correlation, and reporting. You will work closely with security operations, incident response, and other IT teams to ensure that threat intelligence is effectively integrated into the organization's overall security posture. The ability to communicate complex technical information clearly and concisely to both technical and non-technical audiences is essential. As this is a fully remote position, you must be a self-motivated individual with excellent time management skills and the ability to work independently in a virtual environment. A strong commitment to continuous learning and staying abreast of the evolving threat landscape is paramount. You will contribute to the development of threat hunting hypotheses, security alerts, and incident response playbooks based on your intelligence findings. This role offers a unique opportunity to be at the forefront of cybersecurity, safeguarding critical information and systems against sophisticated adversaries. Your expertise will directly contribute to enhancing our client's resilience against cyber-attacks.

Responsibilities:
  • Monitor, collect, and analyze threat intelligence from diverse sources (e.g., OSINT, dark web, security feeds, vendor reports).
  • Identify, track, and profile threat actors, their motivations, and their TTPs.
  • Develop and disseminate actionable threat intelligence reports to relevant stakeholders.
  • Assess the potential impact of emerging threats on the organization's systems and data.
  • Collaborate with security operations and incident response teams to provide context and support during investigations.
  • Develop threat hunting hypotheses and proactively search for indicators of compromise (IOCs).
  • Contribute to the development and refinement of security policies, procedures, and security controls.
  • Stay current with the latest cybersecurity threats, vulnerabilities, and attack trends.
  • Utilize various security tools and platforms for data analysis and intelligence gathering.
  • Participate in tabletop exercises and incident response drills.
Qualifications:
  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
  • 3-5 years of experience in cybersecurity, with a specific focus on threat intelligence or analysis.
  • In-depth knowledge of cyber threats, malware, attack vectors, and threat actor methodologies.
  • Proficiency with threat intelligence platforms, SIEM tools, and data analysis techniques.
  • Experience with scripting languages (e.g., Python) for automation is a plus.
  • Strong analytical and critical thinking skills.
  • Excellent written and verbal communication skills, with the ability to present complex information clearly.
  • Self-motivated with the ability to work effectively in a fully remote setting.
  • Relevant certifications (e.g., GCTI, CTIA, CISSP) are highly desirable.
Apply Now

Cybersecurity Analyst Cyber Threat Intelligence

35824 Huntsville, Alabama TekSynap

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Responsibilities & Qualifications

TEAM SUMMARY

Responsible for monitoring and analyzing external cyber threat data to provide insights and actionable intelligence about potential cyber threats. This team triages information collected from different threat intelligence sources, including internal sources, and study the pattern of attacks, their methodology, motive, severity, and threat landscape applicable to a government agency's systems. This team supports enhancing the overall cybersecurity posture of an organization by delivering timely, relevant, information to stakeholders.

ACTIVITIES & RESPONSIBILITIES

  • Continuously monitor threat intelligence platforms, feeds, and cybersecurity news to detect emerging threats.

  • Conduct deep-dive investigations into alerts generated by Splunk or other monitoring tools.

  • Develop and maintain threat intelligence reports, dashboards, and threat models.

  • Collaborate with SOC, IR, and vulnerability management teams to contextualize and act on threat intelligence.

  • Support cyber threat hunting initiatives by leveraging threat intelligence indicators and hypotheses.

  • Participate in government-led cyber exercises or red/blue team simulations.

  • Provide regular briefings and updates to leadership and stakeholders on emerging cyber threats and trends.

  • Maintain knowledge of the latest cybersecurity trends, zero-day vulnerabilities, APT groups, and geopolitical developments impacting the threat landscape.

SKILLS

  • Cyber Threat Intelligence (CTI) Analysis - Identifying, analyzing, and interpreting cyber threats from various internal and external sources to assess relevance and impact on the organization.

  • Security Information and Event Management (SIEM) Tools - Proficient in using Splunk Enterprise Security for log analysis, alerting, and correlation of security events. Familiar with Microsoft Sentinel for threat detection and response.

  • Incident Response Support - Collaborating with incident response teams to provide threat intelligence that informs remediation and mitigation efforts.

  • Threat Actor Profiling - Studying adversary tactics, techniques, and procedures (TTPs) using frameworks such as MITRE ATT&CK to provide context and attribution.

  • Data Correlation and Enrichment - Correlating disparate data sets (e.g., IOC feeds, vulnerability databases, internal telemetry) to develop actionable intelligence.

  • Report Writing & Briefing - Producing written reports, threat assessments, and briefings for technical and non-technical stakeholders.

  • Communication and Stakeholder Engagement - Interfacing with cross-functional teams and government representatives to convey findings and recommend security posture enhancements.

  • Security Clearance Handling - Operating within a high-security environment with an active Top Secret (TS) clearance; handling and disseminating classified or sensitive information appropriately.

REQUIRED QUALIFICATIONS

  • Bachelor's degree, preferably in an IT-related field

  • 10+ years of experience in IT with a minimum of 4 years in Cybersecurity

  • Active TS Clearance

  • Experience with Splunk Enterprise Security

PREFERRED QUALIFICATIONS & COMPETENCIES

  • Experience with Microsoft Sentinel

  • Related certifications, such as GIAC Cyber Threat Intelligence (GCTI)

Overview

We are seeking an experienced Cybersecurity Analyst / Cyber Threat Intelligence in support of a government customer to join our team. The Program Manager will be responsible for ensuring the successful execution of multiple IT initiatives, ensuring alignment with customer objectives, and managing project scope, schedule, budget, and risk. This role requires strong leadership, communication, and problem-solving skills to drive efficiency and deliver results.

TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. "Technology moving at the speed of thought" embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers.

We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays.

Visit us at .

Apply now to explore jobs with us!

By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP".

"As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration".

Additional Job Information

WORK ENVIRONMENT AND PHYSICAL DEMANDS

The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.

  • Location: Huntsville Alabama

  • Remote or In-Person: On site

  • Type of environment: Office

  • Noise level: Medium

  • Work schedule: Schedule is day shift Monday - Friday.

  • Amount of Travel: Less than 10%

PHYSICAL DEMANDS

The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

WORK AUTHORIZATION/SECURITY CLEARANCE

  • Active Top Secret Clearance Required

OTHER INFORMATION

Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.

TekSynap is a drug-free workplace. We reserve the right to conduct drug testing in accordance with federal, state, and local laws. All employees and candidates may be subject to drug screening if deemed necessary to ensure a safe and compliant working environment.

EQUAL EMPLOYMENT OPPORTUNITY

In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, national origin, disability, age, genetic information, or any other characteristic protected by law (referred to as "protected status"). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment.

Job Locations US-AL-Huntsville

ID

Category Project/Program Management

Type Regular Full-Time

View Now

Senior Cybersecurity Threat Intelligence Analyst

33166 Miami Springs, Florida ManTech

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

**MANTECH** seeks a motivated, career and customer-oriented **Senior** **Cybersecurity Threat Intelligence Analyst** to join our team in **Doral, FL** .
**Responsibilities include but are not limited to:**
+ Proactively identifies, analyzes, and mitigates cybersecurity threats to the organization.
+ Possesses advanced skills in threat intelligence collection, analysis, and dissemination, with a deep understanding of the threat landscape and attack vectors.
+ Leads the development and implementation of threat intelligence strategies, ensuring the organization has timely and actionable insights to defend against evolving threats.
+ Conducts in-depth research on threat actors, malware, vulnerabilities, and attack techniques, producing comprehensive threat assessments and providing expert guidance on mitigation strategies.
+ Collaborates effectively with Security Teams, incident responders, and other stakeholders to proactively address threats and enhance the organization's security posture.
+ Is responsible for developing and maintaining threat intelligence platforms and tools, automating intelligence gathering, staying abreast of trends and techniques, and provides direction and mentorship to subordinate staff and coordinate with other Cybersecurity Threat Intelligence Analyst
**Minimum Qualifications:**
+ BA/BS in field necessary to assume Cybersecurity Threat Intelligence Analyst duties or 4 years of additional experience in lieu of a degree
+ 9+ years of experience with 5+ years of relevant Cybersecurity Threat Intelligence Analyst experience.
+ Progressive experience in cybersecurity threat intelligence or related areas, with a focus on threat analysis and mitigation.
+ Demonstrated expertise in collecting, analyzing, and disseminating threat intelligence from various sources (e.g., open-source intelligence (OSINT), threat feeds, security vendors).
+ Strong understanding of the cybersecurity threat landscape, including common attack vectors, threat actors, malware, and vulnerabilities.
+ Experience with threat intelligence platforms and tools (e.g., ThreatConnect, Anomali, MISP).
+ Experience with data analysis and visualization techniques.
+ CompTIA Security+ or equivalent. DoD -M IAT Level II certification.
**Preferred Qualifications:**
+ Master's degree in Cybersecurity, Intelligence Studies, or a related field.
+ Experience with incident response and threat hunting. Experience with malware analysis and reverse engineering, and security automation and orchestration.
+ Experience with developing and implementing threat intelligence strategies and advanced threat intelligence certifications (e.g., TRE). Certifications in digital forensics or incident response (e.g., GCFA, GCIH).
+ Experience with military/diplomatic operations working within a J-6/G-6/S-6 Directorate or with Special Operations Forces (SOF) or the Department of State (DoS), leading and performing cybersecurity risk assessments for and across multiple commands, agencies, and regionally distributed locations in a Security Operations Center (SOC).
+ At least one industry-recognized threat intelligence certification (e.g., Certified Threat Intelligence Analyst (CTIA), GCTI).
+ Experience at a DoD Combatant Command (e.g., SOUTHCOM, NORTHCOM, CENTCOM, CYBERCOM, INDOPACOM, EUCOM, AFRICOM, STRATCOM, TRANSCOM, SOCOM, SPACECOM) or a component is desired.
**Clearance Requirements:**
+ Must have current/active TS/SCI clearance
**Physical Requirements:**
+ Must be able to remain in stationary position for up to 50% of the time.
+ Must be able to deliver clear and effective communication verbally and via email, phone, and virtual communication platforms to interface with co-workers and customers.
+ Must be able to occasionally move about inside an office environment to access file cabinets, office machinery, and communicate with co-workers.
ManTech International Corporation, as well as its subsidiaries proactively fulfills its role as an equal opportunity employer. We do not discriminate against any employee or applicant for employment. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
If you are a qualified individual with a disability and require a reasonable accommodation to apply for a position with ManTech through its online applicant system, please email us at and provide your name and contact information.
View Now

Cybersecurity Analyst Cyber Threat Intelligence

35808 Redstone Arsenal, Alabama TekSynap

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

**Responsibilities & Qualifications**
**TEAM SUMMARY**
Responsible for monitoring and analyzing external cyber threat data to provide insights and actionable intelligence about potential cyber threats. This team triages information collected from different threat intelligence sources, including internal sources, and study the pattern of attacks, their methodology, motive, severity, and threat landscape applicable to a government agency's systems. This team supports enhancing the overall cybersecurity posture of an organization by delivering timely, relevant, information to stakeholders.
**ACTIVITIES & RESPONSIBILITIES**
+ Continuously monitor threat intelligence platforms, feeds, and cybersecurity news to detect emerging threats.
+ Conduct deep-dive investigations into alerts generated by Splunk or other monitoring tools.
+ Develop and maintain threat intelligence reports, dashboards, and threat models.
+ Collaborate with SOC, IR, and vulnerability management teams to contextualize and act on threat intelligence.
+ Support cyber threat hunting initiatives by leveraging threat intelligence indicators and hypotheses.
+ Participate in government-led cyber exercises or red/blue team simulations.
+ Provide regular briefings and updates to leadership and stakeholders on emerging cyber threats and trends.
+ Maintain knowledge of the latest cybersecurity trends, zero-day vulnerabilities, APT groups, and geopolitical developments impacting the threat landscape.
**SKILLS**
+ Cyber Threat Intelligence (CTI) Analysis - Identifying, analyzing, and interpreting cyber threats from various internal and external sources to assess relevance and impact on the organization.
+ Security Information and Event Management (SIEM) Tools - Proficient in using Splunk Enterprise Security for log analysis, alerting, and correlation of security events. Familiar with Microsoft Sentinel for threat detection and response.
+ Incident Response Support - Collaborating with incident response teams to provide threat intelligence that informs remediation and mitigation efforts.
+ Threat Actor Profiling - Studying adversary tactics, techniques, and procedures (TTPs) using frameworks such as MITRE ATT&CK to provide context and attribution.
+ Data Correlation and Enrichment - Correlating disparate data sets (e.g., IOC feeds, vulnerability databases, internal telemetry) to develop actionable intelligence.
+ Report Writing & Briefing - Producing written reports, threat assessments, and briefings for technical and non-technical stakeholders.
+ Communication and Stakeholder Engagement - Interfacing with cross-functional teams and government representatives to convey findings and recommend security posture enhancements.
+ Security Clearance Handling - Operating within a high-security environment with an active Top Secret (TS) clearance; handling and disseminating classified or sensitive information appropriately.
**REQUIRED QUALIFICATIONS**
+ Bachelor's degree, preferably in an IT-related field
+ 10+ years of experience in IT with a minimum of 4 years in Cybersecurity
+ Active TS Clearance
+ Experience with Splunk Enterprise Security
**PREFERRED QUALIFICATIONS & COMPETENCIES**
+ Experience with Microsoft Sentinel
+ Related certifications, such as GIAC Cyber Threat Intelligence (GCTI)
**Overview**
We are seeking an experienced **Cybersecurity Analyst / Cyber Threat Intelligence** in support of a government customer to join our team. The Program Manager will be responsible for ensuring the successful execution of multiple IT initiatives, ensuring alignment with customer objectives, and managing project scope, schedule, budget, and risk. This role requires strong leadership, communication, and problem-solving skills to drive efficiency and deliver results.
TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. "Technology moving at the speed of thought" embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers.
We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays.
Visit us at .
Apply now to explore jobs with us!
By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status. If at any time you would like to opt out of text messaging, respond "STOP".
"As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration".
**Additional Job Information**
**WORK ENVIRONMENT AND PHYSICAL DEMANDS**
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of the job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
+ Location: Huntsville Alabama
+ Remote or In-Person: On site
+ Type of environment: Office
+ Noise level: Medium
+ Work schedule: Schedule is day shift Monday - Friday.
+ Amount of Travel: Less than 10%
**PHYSICAL DEMANDS**
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
**WORK AUTHORIZATION/SECURITY CLEARANCE**
+ Active Top Secret Clearance Required
**OTHER INFORMATION**
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
TekSynap is a drug-free workplace. We reserve the right to conduct drug testing in accordance with federal, state, and local laws. All employees and candidates may be subject to drug screening if deemed necessary to ensure a safe and compliant working environment.
**EQUAL EMPLOYMENT OPPORTUNITY**
In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities. TekSynap does not discriminate against any person because of race, color, creed, religion, sex, national origin, disability, age, genetic information, or any other characteristic protected by law (referred to as "protected status"). This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment.
**Job Locations** _US-AL-Huntsville_
**ID** _ _
**Category** _Project/Program Management_
**Type** _Regular Full-Time_
View Now

Senior Cybersecurity Threat Intelligence Analyst

90012 Los Angeles, California $125000 Annually WhatJobs

Posted today

Job Viewed

Tap Again To Close

Job Description

full-time
Our client, a leader in protecting critical digital infrastructure, is seeking a highly skilled and experienced Senior Cybersecurity Threat Intelligence Analyst to join their advanced security operations center in Los Angeles, California, US . This role is paramount in identifying, analyzing, and mitigating advanced persistent threats (APTs) and other sophisticated cyber risks. The ideal candidate will possess a deep understanding of the threat landscape, adversary tactics, techniques, and procedures (TTPs), and have a proven ability to translate complex intelligence into actionable security measures. You will be at the forefront of defending against evolving cyber threats.

Key Responsibilities:
  • Proactively collect, analyze, and disseminate actionable threat intelligence from various sources (e.g., OSINT, dark web, private feeds, government reports).
  • Identify and track emerging cyber threats, threat actors, and their motivations and capabilities.
  • Develop and maintain threat models and profiles of adversaries targeting our client's industry.
  • Provide timely and relevant threat intelligence to incident response, security operations, and IT teams.
  • Create comprehensive threat intelligence reports, briefings, and visualizations for technical and executive audiences.
  • Develop and refine TTPs based on observed threat activity to enhance detection and prevention capabilities.
  • Conduct deep-dive investigations into specific threat campaigns and malware.
  • Automate intelligence collection, processing, and analysis workflows where possible.
  • Collaborate with internal security teams and external partners to share threat information and coordinate response efforts.
  • Mentor junior analysts and contribute to the development of threat intelligence best practices.
  • Stay current with the latest cybersecurity trends, vulnerabilities, and exploit techniques.
Qualifications:
  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field. Master's degree or relevant certifications (e.g., GIAC, CISSP) are highly valued.
  • A minimum of 7 years of experience in cybersecurity, with a significant focus on threat intelligence analysis, incident response, or malware analysis.
  • Demonstrated expertise in analyzing complex threat data, identifying indicators of compromise (IOCs), and understanding adversary TTPs.
  • Proficiency with threat intelligence platforms, SIEM tools, and security analytics tools.
  • Strong knowledge of various attack vectors, exploit techniques, and malware analysis.
  • Excellent research, analytical, and critical thinking skills.
  • Exceptional written and verbal communication skills, with the ability to articulate complex technical information clearly.
  • Ability to work independently and collaboratively in a high-pressure, fast-paced environment.
  • Experience with scripting or programming languages (e.g., Python) for automation is a strong asset.
  • A deep understanding of geopolitical factors influencing cyber threats is beneficial.
This is a critical role in safeguarding our client's digital assets. We offer a competitive salary, comprehensive benefits, and the opportunity to work on challenging and impactful security initiatives. Join a team dedicated to staying ahead of evolving cyber threats.
Apply Now

Senior Cybersecurity Analyst - Threat Intelligence

98101 Seattle, Washington $135000 Annually WhatJobs

Posted today

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a proactive and highly skilled Senior Cybersecurity Analyst specializing in Threat Intelligence to join their Security Operations Center in **Seattle, Washington, US**. This critical role involves identifying, analyzing, and responding to emerging cyber threats that could impact the organization's digital assets and operations. The ideal candidate will possess a deep understanding of threat actor methodologies, attack vectors, and the geopolitical landscape influencing cybersecurity. You will be responsible for enriching security data, developing actionable intelligence, and collaborating with incident response teams to proactively defend against sophisticated cyber adversaries.

Responsibilities:
  • Monitor and analyze threat intelligence feeds, security alerts, and open-source information to identify potential threats and vulnerabilities.
  • Research and track threat actors, their tactics, techniques, and procedures (TTPs), and motivations.
  • Develop and maintain threat intelligence reports, dashboards, and presentations for various stakeholders, including technical teams and executive leadership.
  • Collaborate with incident response teams to provide context and support during security investigations.
  • Identify indicators of compromise (IOCs) and develop detection rules for security monitoring systems (SIEM, IDS/IPS).
  • Contribute to the development and refinement of the organization's threat hunting methodologies.
  • Evaluate and recommend new threat intelligence tools and technologies.
  • Build relationships with external threat intelligence communities and information-sharing groups.
  • Provide expertise on emerging threats and advise on security control improvements.
  • Document threat intelligence processes, methodologies, and findings.
  • Participate in tabletop exercises and simulations to test incident response capabilities.
  • Stay current with the latest cybersecurity threats, trends, and defensive strategies.
Qualifications:
  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
  • Minimum of 5 years of experience in cybersecurity, with a focus on threat intelligence, incident response, or security operations.
  • Proven experience in analyzing threat actor TTPs and developing actionable intelligence.
  • Strong understanding of malware analysis, network security, and host-based security.
  • Proficiency with SIEM platforms, IDS/IPS, endpoint detection and response (EDR) solutions, and threat intelligence platforms (TIPs).
  • Experience with scripting languages (e.g., Python, PowerShell) for automation and data analysis is highly desirable.
  • Familiarity with various threat intelligence frameworks (e.g., MITRE ATT&CK).
  • Excellent analytical, research, and problem-solving skills.
  • Strong written and verbal communication skills, with the ability to present complex information clearly.
  • Ability to work independently and as part of a collaborative team in a fast-paced environment.
  • Relevant certifications such as GIAC Certified Incident Handler (GCIH), GIAC Certified Threat Intelligence (GCTI), or CISSP are a plus.
This role offers a significant opportunity to shape our client's defensive posture against advanced threats and grow within a leading technology company. Our client provides competitive compensation, a comprehensive benefits package, and a dynamic work environment.
Apply Now
Be The First To Know

About the latest Cybersecurity Jobs in United States !

Senior Cybersecurity Analyst (Threat Intelligence)

27601 Whispering Pines, North Carolina $175000 Annually WhatJobs

Posted today

Job Viewed

Tap Again To Close

Job Description

full-time
Our client, a leader in safeguarding digital assets, is seeking a highly skilled Senior Cybersecurity Analyst specializing in Threat Intelligence to join their fully remote team. In this crucial role, you will be responsible for identifying, analyzing, and responding to advanced cyber threats targeting our organization and clients. You will leverage cutting-edge tools and techniques to gather intelligence on emerging threats, vulnerabilities, and attacker methodologies. Your insights will be critical in developing proactive defense strategies, enhancing our security posture, and protecting sensitive information. This position requires a deep understanding of the threat landscape, sophisticated analytical skills, and the ability to communicate complex technical information effectively.

Key responsibilities include:
  • Collecting, analyzing, and correlating threat intelligence data from various sources, including open-source intelligence (OSINT), dark web monitoring, and internal security telemetry.
  • Developing and maintaining threat models and intelligence reports on relevant threat actors, campaigns, and malware.
  • Identifying new and emerging cyber threats, vulnerabilities, and attack vectors that could impact the organization.
  • Providing timely and actionable intelligence to incident response, security operations, and IT teams.
  • Developing and implementing threat hunting methodologies to proactively identify malicious activity.
  • Assisting in the development and refinement of security policies, procedures, and controls based on threat intelligence.
  • Conducting research on advanced persistent threats (APTs), nation-state actors, and organized cybercrime groups.
  • Utilizing security information and event management (SIEM) systems and threat intelligence platforms (TIPs).
  • Collaborating with internal stakeholders and external partners to share threat information and coordinate defensive actions.
  • Mentoring junior analysts and contributing to the continuous improvement of the threat intelligence program.
The ideal candidate will possess a Bachelor's or Master's degree in Cybersecurity, Computer Science, Information Technology, or a related field. A minimum of 7 years of experience in cybersecurity, with at least 3 years focused on threat intelligence, incident response, or security operations is required. Deep understanding of threat actor tactics, techniques, and procedures (TTPs) is essential. Proficiency with threat intelligence platforms, SIEM solutions, and various security tools is mandatory. Experience with scripting languages (e.g., Python, PowerShell) for data analysis and automation is highly desirable. Strong analytical, research, and communication skills are critical. Relevant certifications such as CISSP, GIAC, or similar are a strong plus. This is a challenging and rewarding opportunity to defend against the most sophisticated cyber threats.
Apply Now

Senior Cybersecurity Threat Intelligence Analyst

95811 Sacramento, California $135000 Annually WhatJobs

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a highly motivated and experienced Senior Cybersecurity Threat Intelligence Analyst to join their remote-first security operations team. In this role, you will be at the forefront of identifying, analyzing, and mitigating advanced cyber threats that target our organization. You will be responsible for gathering intelligence from various sources, including open-source intelligence (OSINT), dark web monitoring, commercial threat feeds, and internal security telemetry. Your analysis will focus on understanding threat actor methodologies, motivations, and capabilities to provide actionable insights that enhance our defensive posture. This includes developing detailed threat profiles, tracking emerging attack vectors, and predicting future threat trends. You will play a critical role in developing and refining our threat intelligence program, ensuring its effectiveness and scalability. This position requires a deep understanding of the global threat landscape, including nation-state actors, cybercrime syndicates, and hacktivist groups. You will work closely with incident response, security engineering, and CTI teams to operationalize intelligence and improve our detection and response capabilities. The ability to communicate complex technical information clearly and concisely to both technical and non-technical audiences is paramount. You will also contribute to strategic security planning by providing intelligence-driven recommendations. A bachelor's degree in Computer Science, Cybersecurity, or a related field is required, along with a minimum of 5 years of experience in cybersecurity, with a significant focus on threat intelligence. Certifications such as GCTI, CISSP, or relevant GIAC certifications are highly desirable. Experience with threat intelligence platforms (TIPs), SIEM tools, and data analysis techniques is essential. You must possess strong research, analytical, and critical thinking skills, with a keen eye for detail and the ability to work independently in a remote environment. Familiarity with scripting languages (e.g., Python) for data automation and analysis is a plus. You will be expected to demonstrate expertise in malware analysis, reverse engineering, and digital forensics concepts as they relate to threat intelligence.
Apply Now

Senior Cybersecurity Threat Intelligence Analyst

68101 Omaha, Nebraska $115000 Annually WhatJobs

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is actively seeking a Senior Cybersecurity Threat Intelligence Analyst to join their fully remote security operations team. In this critical role, you will be at the forefront of identifying, analyzing, and mitigating advanced cyber threats that target our organization. Your expertise will be vital in understanding the evolving threat landscape, identifying adversary tactics, techniques, and procedures (TTPs), and translating this intelligence into actionable defensive measures. You will leverage a wide array of tools and data sources to track threat actors, monitor global security events, and provide timely, accurate intelligence reports to stakeholders across the business. This position requires a proactive, analytical mindset and the ability to thrive in a dynamic, remote work environment.

Key Responsibilities:
  • Conduct in-depth research and analysis of emerging cybersecurity threats, threat actors, and campaigns.
  • Develop and maintain a comprehensive understanding of the global threat landscape, including nation-state actors, cybercriminals, and hacktivists.
  • Analyze malware, phishing attempts, and other attack vectors to identify indicators of compromise (IOCs) and TTPs.
  • Utilize various threat intelligence platforms, security tools, and open-source intelligence (OSINT) resources.
  • Produce high-quality threat intelligence reports, briefings, and alerts for technical and executive audiences.
  • Collaborate with Security Operations Center (SOC) analysts, incident response teams, and other security professionals to provide actionable intelligence.
  • Develop and refine threat models and hypotheses based on collected intelligence.
  • Contribute to the development and improvement of security monitoring and detection capabilities based on threat intelligence.
  • Stay current with the latest cybersecurity trends, vulnerabilities, and defensive strategies.
  • Participate in threat hunting activities to proactively identify threats within the network.
  • Mentor junior analysts and share knowledge across the security team.

Qualifications:
  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
  • Minimum of 5 years of experience in cybersecurity, with a strong focus on threat intelligence, incident response, or malware analysis.
  • Demonstrated experience in analyzing threat data from various sources, including logs, network traffic, and threat feeds.
  • Proficiency with threat intelligence tools, SIEM platforms, and security analytics software.
  • Understanding of common attack vectors, malware families, and adversary TTPs (e.g., MITRE ATT&CK framework).
  • Excellent analytical, research, and problem-solving skills.
  • Strong written and verbal communication skills, with the ability to convey complex technical information clearly.
  • Ability to work independently and collaboratively in a remote team environment.
  • Relevant certifications such as CySA+, GCIA, GCIH, or CISSP are a plus.

This is an excellent opportunity to contribute significantly to the cybersecurity posture of a leading organization while enjoying the flexibility of a remote work arrangement.
Apply Now
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybersecurity Jobs