Security Threat hunting Analyst
Seattle, Washington, United States
Applications have closed
Exciting Security Threat Analyst, 12 plus months contract, opportunity.
Requirements
- Research security events and determine whether the event is opportunistic or targeted.
- Create and receive alerts to set an early warning system on threat actor activity targeting an organization or individual members
- 3 plus years experience in the field of security analysis, intelligence, engineering, architecture, operations and/or assurance functions;
Experience using Threat Intelligence Platforms such as Threat Connect, TruStar - Demonstrable experience in the area of malware analysis, threat intelligence, vulnerability management and security assurance.
- Participate in incident prevention, detection and response by utilizing available research to drive focused defensive actions or to guide investigation
- Deliver expert cyber intelligence services and material to information technology and business leaders.
- Prepare appropriate threat intelligence content for customer and executive presentations
- Interface with other teams in information security (security operations, incident response and vulnerability management) along with information risk officers and technology management to help guide cyber security strategy
- Enhance security monitoring and Incident Response team knowledge to support their respective missions.
- Work with team members to enhance security.
Tags: Incident response Malware Monitoring Security analysis Security strategy Strategy Threat intelligence Vulnerability management
Perks/benefits: Team events
Region:
North America
Country:
United States
Job stats:
39
2
0
Categories:
Analyst Jobs
Threat Intel Jobs
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Ethical hacker / Pentester H/F jobs
- Open Information Security Specialist jobs
- Open Manager Pentest H/F jobs
- Open Senior Cyber Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Cyber Security Specialist jobs
- Open Product Security Engineer jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Principal Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Chief Information Security Officer jobs
- Open Consultant SOC / CERT H/F jobs
- Open Cybersecurity Consultant jobs
- Open Security Specialist jobs
- Open Senior Information Security Engineer jobs
- Open Cybersecurity Specialist jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Sr. Security Engineer jobs
- Open Senior Security Architect jobs
- Open Security Operations Analyst jobs
- Open Clearance-related jobs
- Open ISO 27001-related jobs
- Open Windows-related jobs
- Open Application security-related jobs
- Open Network security-related jobs
- Open Agile-related jobs
- Open Pentesting-related jobs
- Open Vulnerability management-related jobs
- Open GCP-related jobs
- Open Analytics-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Security assessment-related jobs
- Open Java-related jobs
- Open IDS-related jobs
- Open DevOps-related jobs
- Open Malware-related jobs
- Open Security Clearance-related jobs
- Open EDR-related jobs
- Open Kubernetes-related jobs
- Open IPS-related jobs
- Open CEH-related jobs