Threat Intelligence Consultant- Remote (Anywhere in the U.S.)

Remote

GuidePoint Security LLC

View company page

GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions and minimize risk. By taking a three-tiered, holistic approach for evaluating security posture and ecosystems, GuidePoint enables some of the nation’s top organizations, such as Fortune 500 companies and U.S. government agencies, to identify threats, optimize resources and integrate best-fit solutions that mitigate risk.

Description

GuidePoint Security’s Research & Intelligence Team (GRIT) performs the following:

  • Threat Intelligence as a Service
  • Threat Intelligence Maturity Assessments
  • Malware Analysis
  • Proactive Threat Discovery and Threat Hunting
  • Purple Team Exercises (as Blue Team in collaboration with GuidePoint Red Team)
  • Threat Research

As a GRIT Consultant, you will be a technical resource that leverages your knowledge, skills, and experience to help deliver results to clients in various sectors.

Role Requirements

Your primary responsibilities revolve around solving challenging and complex problems and include helping customers reach their goals with Threat Intelligence. In that effort GRIT strives to either offer Threat Intelligence as a Service or help the client mature their program to meet their goals, including providing workshops and documentation. Additional duties with this role include researching the latest threats, providing malware analysis support, giving threat briefs to customers and senior leadership, and assisting the DFIR team on an as needed basis.    

GuidePoint Security’s GRIT service offerings are perpetually evolving in response to emerging threats and diverse client needs, and your creativity and expertise will assist the GRIT Practice with adapting to this rapidly changing environment. Primary Duties will include:

  • Operate as a technical resource within the Practice and actively participate in DFIR investigations to provide actionable intelligence
  • Effective engagement communication, time management, and collaboration with peers
  • Author comprehensive engagement deliverables that are tailored to both technical and managerial audiences as well as fully detail the technical findings, recommendations, business impact, and realistic remediation strategies
  • Foster client relationships by providing support, information, and guidance
  • Utilize automation, orchestration, and scripting to reduce manual processes, improving overall efficiency while also enabling new capabilities to meet the rapidly changing needs of our clients
  • Contribute to integration of existing and future open-source and commercial tools to help improve GRIT processes and procedures
  • Perpetually strengthen relevant skills, knowledge, and abilities to stay at the forefront of the information security industry
  • Maintain a strong desire to learn, adapt, and improve along with a rapidly-growing company
  • Perform other duties as assigned

Education and Experience

Essential Qualifications

  • Two (2+) years of experience performing Threat Intelligence analysis
  • Five (5+) combined years of IT and information security experience

Preferred Qualifications

  • Prior experience in a Consulting Services role
  • Experience implementing or improving operational processes or procedures in the intelligence analysis lifecycle.
  • Proficiency hunting APT data using open source or commercial cyber threat analytic tools or data repositories such as VirusTotal, Passive Total, Threat Miner, or Maltego
  • Core capabilities include:
    • Network traffic analysis
    • Host forensics
    • Malware handling / triage
    • Log review
  • Experience with a variety of industry-related solutions including EDR, SIEM, NDR, FW, NGAV, Velociraptor, OSQuery, and others
  • Strong ability to correlate data and research using open source repositories (ex. VirusTotal, Domaintools, Threatminer, etc.)
  • Intermediate ability to present technical information and analysis to audiences up to 50 persons on a quarterly basis.
  • Ability to apply formal intelligence analysis methods, develop hypothesis, prove/disprove relationships, always ask why, defend your analysis, and apply attribution to cyber threat activity.
  • Ability to make confidence-based assessments for purposes of attribution based on their technical analysis of network traffic, multi-source data, malware and system analysis. Candidate must be able to identify analytic bias
  • Experience with common programming languages including PowerShell, Python, BASH, Go, or others
  • Experience with cloud technologies for the enterprise, such as Amazon Web Services, G Suite, Office 365, and Azure.
  • Awareness of attacker techniques, advanced threat groups, and integration of intelligence into an investigation
  • Other relevant industry certifications, such as but not limited to GCIA, GCIH, GDAT, GCFE, and GFCA

 

Why GuidePoint?

GuidePoint Security is a rapidly growing, profitable, privately-held value added reseller that focuses exclusively on Information Security. Since its inception in 2011, GuidePoint has grown to over 700 employees, established strategic partnerships with leading security vendors, and serves as a trusted advisor to more than 3,000 Enterprise-Level customers.

Firmly-defined core values drive all aspects of the business, which have been paramount to the company’s success and establishment of an enjoyable workplace atmosphere. At GuidePoint, your colleagues are knowledgeable, skilled, and experienced and will seek to collaborate and provide mentorship and guidance at every opportunity.  

This is a unique and rare opportunity to grow your career along with one of the fastest growing companies in the nation.

Some added perks….

  • Remote workforce primarily (U.S. based only, some travel may be required for certain positions, working on-site may be required for Federal positions)
  • 100% employer-paid medical and dental premiums with generous employer family contributions
  • 11 corporate holidays in 2022 (12 in 2023) and a Flexible Time Off (FTO) program
  • Healthy mobile phone and home internet allowance
  • Eligibility for retirement plan after 2 months at open enrollment
  • Pet Care plan

 

Tags: APT Automation Azure Bash Blue team Cloud DFIR EDR Forensics GCIA GCIH Incident response Malware Open Source PowerShell Python Red team Scripting SIEM Threat intelligence Threat Research VirusTotal

Perks/benefits: Career development Flex hours Flex vacation Home office stipend

Region: Remote/Anywhere
Job stats:  37  7  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.