Intrusion Analyst 3

GormatSan Antonio, TX

About The Position

We are looking for an Intrusion Analyst to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources. You will analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis. You will categorize traffic as benign, suspicious, or malicious activity; and document malicious tactics, techniques, and procedures (TTPs). You will also develop and implement mitigation strategies. The ideal candidate will have a network and/or host-based focus.

Requirements

  • Relevant experience must be in malware analysis
  • Doctoral degree plus 4 years of relevant experience
  • Master's degree with 6 years of relevant experience
  • Bachelor's Degree with 8 years of relevant experience
  • Associates degree with 10 years of relevant experience
  • Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, or related discipline from accredited college or university.
  • CISSP, CEH, Sec+, Net+, GIAC GREM and/or CREA Certification is required for Level 2 and 3
  • TS/SCI with polygraph is required.

Nice To Haves

  • Programming experience in C, C#, C++, Java, Perl, or Python is preferred.
  • CISSP, GIAC GREM or CREA Certification is preferred for level 1.
  • Supporting CSD; deep understanding of cyber threat intelligence, preferably against hard targets like state-sponsored APTs.
  • Strong skills using customer toolset and depth of experience leveraging the SIGINT system for technical data

Responsibilities

  • Discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources.
  • Analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis.
  • Categorize traffic as benign, suspicious, or malicious activity.
  • Document malicious tactics, techniques, and procedures (TTPs).
  • Develop and implement mitigation strategies.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service