What are the responsibilities and job description for the Cyber Security Analyst position at PROCAL TECHNOLOGIES?
Job Title: Cyber Security Intelligence Analyst
Location: Washington, DC Metro Area (Onsite)
Employment Type: Full-time (USC Only)
Clearance Requirement: Active Secret Clearance (Mandatory)
About the Role
We are seeking a detail-oriented and analytical Cyber Security Intelligence Analyst to join our security operations team. The ideal candidate will monitor, identify, and analyze cyber threats and security incidents, providing actionable intelligence to strengthen the organization’s security posture.
Key Responsibilities:
- Monitor and analyze security alerts, network traffic, and threat intelligence feeds to identify potential cyber threats and vulnerabilities.
- Perform threat hunting, incident analysis, and malware investigation using SIEM and endpoint security tools.
- Collect, evaluate, and correlate data from various threat intelligence sources (open source, commercial, and internal).
- Prepare intelligence reports, threat briefings, and dashboards for internal stakeholders and leadership.
- Collaborate with the SOC, Incident Response, and IT security teams to support timely mitigation and response.
- Research and track emerging cyber threats, APT groups, and attack vectors relevant to the organization’s environment.
- Contribute to improving detection rules, threat models, and response procedures.
- Ensure compliance with organizational and regulatory cybersecurity standards and frameworks (e.g., NIST, ISO 27001).
Required Skills and Qualifications:
- Bachelor’s degree in Cybersecurity, Computer Science, IT, or a related field.
- 3 years of experience in cyber threat intelligence, SOC analysis, or incident response.
- Strong understanding of network protocols, intrusion detection, malware behavior, and threat actor tactics (MITRE ATT&CK).
- Hands-on experience with tools like Splunk, QRadar, ELK Stack, ThreatConnect, MISP, Wireshark, or CrowdStrike Falcon.
- Ability to analyze large datasets and generate actionable intelligence.
- Excellent communication, analytical, and report-writing skills.
Preferred / Nice-to-Have Certifications:
- CompTIA Security , CEH (Certified Ethical Hacker), GCTI (GIAC Cyber Threat Intelligence), or CISSP (Certified Information Systems Security Professional).
- Experience with threat modeling frameworks, MITRE ATT&CK, or STIX/TAXII standards.