Recent Searches

You haven't searched anything yet.

1 Cybersecurity Threat Intelligence Analyst - Mid Level (No clearance required) Job in Houston, TX

SET JOB ALERT
Details...
Cybersecurity Threat Intelligence Analyst - Mid Level (No clearance required)
Apply
$92k-118k (estimate)
Full Time 1 Week Ago
Save

RedTrace Technologies Inc is Hiring a Cybersecurity Threat Intelligence Analyst - Mid Level (No clearance required) Near Houston, TX

Company Overview: As a Cybersecurity, Information Technology, and Management Consulting firm focused on assisting our commercial and U.S. Intelligence Community clients proactively mitigate threats, RedTrace Technologies is seeking talented and innovative team members to join us in support of an exciting opportunity with our commercial client.
Position Description:
As a Cybersecurity Threat Intelligence Analyst, you will:
  • Leverage the threat intelligence lifecycle and priority intelligence requirements to track threat actors, research cyber threats, conduct analysis and create threat intelligence reporting to support Cyber Intelligence Centre's internal customers
  • Produce a variety of intelligence reporting from technical audiences to the executive level
  • Analyze external technical and non-technical data from various intelligence sources (paid, open and closed) to build threat actor profiles and track threat actor activities both externally and internally
  • Research new and emerging vulnerabilities, threat actor's tactics, techniques, and procedures, and conduct threat hunting within the company's environment for the presence of related activity
  • Collaborate with members of the Threat Intelligence team on emerging threats, cyber threat actor's activities, targeting and operational tempo
  • Prepare and deliver intelligence briefs to a variety of audiences
Qualifications:
Required:
  • 5-7 Years of CTI experience.
  • Past working experience working on a cyber threat intelligence team with experience analyzing, tracking and reporting on nation state, cybercrime and non-state supported threat actors
  • Experience working with the threat intelligence lifecycle and utilizing priority intelligence requirements to drive intelligence operational workflow
  • Experience in leveraging analytic judgement to create high quality intelligence reporting
  • Technical background with internal threat hunting experience and knowledgeable in how threat actors exploit vulnerabilities
  • Technical experience analyzing threat actor's tactics, technical and procedures; malware analysis, network traffic, endpoint activity and vulnerabilities and exploits
  • Leveraging analytic judgement to write high quality intelligence reporting with attention to detail and content that is relevant, accurate and timely
  • Technical analysis skills to analyze internal data and external information to hunt various threats
  • Ability to process and analyze information from multiple data sources, apply analytic judgment and remove bias, and create intelligence products
  • Strong communication skills, both written and verbal, attention to detail and a proven ability to influence stakeholders effectively
Employee Benefits:
  • Competitive salary for well qualified applicants
  • 401(k) plan
  • Annual performance bonus
  • Certification and advanced degree attainment bonuses
  • Student Loan / Tuition reimbursement
  • Health Care Insurance (medical, dental, vision)
  • Up to four weeks of paid vacation
  • 11 Federal Holidays, and 3 Floating Holidays
  • Team bonding events
Location: This position offers a hybrid work schedule (two days per week in the office) and every other Friday off.
RedTrace Technology is an EOE employer.

Job Summary

JOB TYPE

Full Time

SALARY

$92k-118k (estimate)

POST DATE

06/08/2024

EXPIRATION DATE

06/27/2024

WEBSITE

redtracetech.com

HEADQUARTERS

Washington, DC

Show more