Cyber Threat Intelligence Analyst, Mid

Booz Allen HamiltonArlington, VA
2d$62,000 - $141,000

About The Position

As a cyber threat intelligence analyst, you know the key to detecting and deterring malicious activity is quality risk-based intel that maps to a tactical behavior. At Booz Allen, you can apply your expertise to investigate the most pressing cyber threats impacting our nation's critical infrastructure. This is your chance to help a team as they take on the adversary’s perspective, identify their motivations, and recommend ways to harden systems, reduce their attack surface, and thwart malicious actors. As a Cyber Threat Intelligence Analyst on our team, you’ll oversee the collection, documentation, assessment, and analysis of raw cyber threat information using tools and technologies like MISP, ThreatQ, FireEye, LookingGlass, MITRE Attack Framework, Linux, UNIX, and tcpdump, to enrich intelligence. You’ll conduct strategic assessments on systems and networks and provide tactical analyses and influential recommendations for network operation. You’ll be the key to discovering and correlating timely threat intel and deciphering what represents a real risk, and you’ll play a lead role in incident analysis, adversarial research, and finished intelligence products to inform policymakers, cyber operators, and mission area leadership. Cyber threats are evolving. Booz Allen is committed to creating an environment where you not only keep pace with the industry, but propel it forward. With access to academic programs, certifications, and opportunities to use expert tradecraft, we’ll continuously invest in you so you can create the career you want as you grow. Join us. The world can’t wait.

Requirements

  • Experience with intelligence analysis principles and cyber threat intelligence principles
  • Experience in a consulting environment, communicating technical subjects to clients
  • Knowledge of information security and IT threats, attacks, and vulnerabilities
  • Knowledge of cybersecurity concepts
  • Ability to work independently with minimal supervision
  • TS/SCI clearance
  • HS diploma or GED and 10+ years of experience with cybersecurity, Bachelor’s degree and 6+ years of experience with cybersecurity, or Master’s degree and 4+ years of experience with cybersecurity

Nice To Haves

  • Experience with computer network protocols and operations
  • Experience with the IC and its products, procedures, and computer networks
  • Knowledge of Advanced Persistent Threats
  • Knowledge of analytic threat models, including ATT&CK, Pyramid of Pain, and Diamond Model
  • Ability to perform queries on indicators and characteristics, including Message-Digest Algorithm 5, Secure Hash Algorithm 1, IP Addresses, file size, file name, and file paths
  • Ability to conduct classified and unclassified research using research tools
  • Possession of excellent analytical, problem-solving, and verbal and written communication skills
  • Net+, Security+, CEH, CCNA, or SANS Certifications

Responsibilities

  • oversee the collection, documentation, assessment, and analysis of raw cyber threat information using tools and technologies like MISP, ThreatQ, FireEye, LookingGlass, MITRE Attack Framework, Linux, UNIX, and tcpdump, to enrich intelligence
  • conduct strategic assessments on systems and networks and provide tactical analyses and influential recommendations for network operation
  • play a lead role in incident analysis, adversarial research, and finished intelligence products to inform policymakers, cyber operators, and mission area leadership

Benefits

  • health
  • life
  • disability
  • financial
  • retirement benefits
  • paid leave
  • professional development
  • tuition assistance
  • work-life programs
  • dependent care
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service