What are the responsibilities and job description for the Sr Analyst-Threat Intelligence (Day Shift) position at Access Point Consulting?
Description
We are currently seeking a full-time Senior Threat Analyst for the hours of 8am-5pm.
The Senior Threat Analyst plays a crucial role in ensuring the efficient and effective use of threat analytics within the organization. This position involves analyzing complex business problems, designing and implementing threat hunting, threat intelligence & Incident response solutions, and providing technical expertise and support where necessary. You will be responsible for collecting, analyzing, and disseminating actionable threat intelligence to various stakeholders, including security operations incident response, and executive management teams. You will also collaborate with internal and external partners to share threat information and best practices.
Supervisory Responsibilities
We are currently seeking a full-time Senior Threat Analyst for the hours of 8am-5pm.
The Senior Threat Analyst plays a crucial role in ensuring the efficient and effective use of threat analytics within the organization. This position involves analyzing complex business problems, designing and implementing threat hunting, threat intelligence & Incident response solutions, and providing technical expertise and support where necessary. You will be responsible for collecting, analyzing, and disseminating actionable threat intelligence to various stakeholders, including security operations incident response, and executive management teams. You will also collaborate with internal and external partners to share threat information and best practices.
Supervisory Responsibilities
- Guide threat analysts in threat detection, investigation and response.
- Mentor threat analysts and contribute to team knowledge sharing.
- Review and approve threat analysis reports and incident findings
- Oversee daily threat monitoring and incident response activities.
- Lead threat hunting and intelligence initiatives.
- Present threat findings to senior leadership, stakeholders, and external stakeholders.
- Maintain documentation of threat trends, incidents, and mitigation efforts.
- Act as a liaison between technical teams and executive leadership.
- Proactively hunt & build hunt plans for threats across endpoints, networks, cloud, and identity systems using behavioral analytics, threat intelligence, and anomaly detection.
- Provide in-depth analysis of malware, phishing campaigns, and advanced persistent threats (APTs).
- Develop and refine threat hunting & intelligence methodologies, playbooks and hunt plans.
- Ensure adherence to security protocols and escalation procedures.
- Coordinate with security operations (SOC) and vulnerability management (VM) teams to maintain operational efficiency.
- Collaborate with SOC analysts, incident responders, and threat analysts to validate findings and confirm escalated threats.
- Analyze large datasets to identify patterns and indicators of compromise (IOCs).
- Conduct root cause analysis and provide actionable recommendations to improve detection and response capabilities.
- Stay current with emerging threats, APT tactics, and adversary techniques (MITRE ATT&CK, etc.).
- Create detailed reports and dashboards for technical and executive audiences.
- Provide Incident Response support.
- Develop and refine threat detection and intelligence strategies and playbooks.
- Perform other duties as assigned
- Excellent analytical and effective problem-solving skills.
- Excellent verbal and written communication skills
- Ability to think critically and creatively to solve complex security challenge
- Excellent interpersonal skills
- Self-motivated and detail oriented with a passion for cybersecurity
- Strong teamwork and collaboration skills.
- Bachelor’s degree in cybersecurity, computer science or related field or equivalent work experience.
- 3 years of experience in cybersecurity, with a focus on threat hunting, incident response, or threat intelligence.
- Strong understanding of the cyber kill chain, MITRE ATT&CK framework, and TTPs of advanced threat actors.
- Proficiency in using security tools such as SIEM, EDR, and threat intelligence platforms.
- Experience with scripting and automation using languages like Python, PowerShell, or Bash.
- Knowledge of network protocols, system logs, and endpoint security.
- Certifications such as GIAC Cyber Threat Intelligence (GCTI), Certified Threat Hunting Professional (CTHP), or similar are a plus.
Business Intelligence Analyst
BDP International -
Allentown, PA
Artificial Intelligence Business Analyst Intern
SharkNex -
Bethlehem, PA
Sr. Risk Analyst
SHI International Corp. -
Bethlehem, PA