Back to Job Search

Cyber Threat Intelligence Technical Analyst

  • Location: New York, New York, 10013
  • Job Type:Contract

Posted 9 days ago

Terrific 12+ month contract opportunity in New York, NY for a Cyber Threat Intelligence Technical Analyst. Will conduct reverse engineering, perform original research, and generate technical enrichment to support tactical, operational, and strategic reporting. Will be able to identify and analyze long and short-term cyber threats potentially impacting the company and its clients and will disseminate this information to the company’s cyber security teams. Will be responsible for cyber threat analysis and reporting tasks performed on a daily basis as well as internal and external partnership functions.  Will work remotely until offices reopen.
  • Supports CIC and Cyber Security Fusion Center (CSFC) requests and investigations.
  • Interacts daily with globally-located CIC and CSFC Center staff members.
  • Actively monitors and researches cyber threats with a direct or indirect impact to the the company brand and examines associated tools, techniques, and procedures (TTP) to reconstruct attacker workflows.
  • Reverse engineers malware and analyzes reports to correlate and contextualize threat data.
  • Maps threats to the Mitre ATT&CK framework and communicates effective mitigation procedures where appropriate.
  • Expands research and information scope using common enrichment platforms (e.g. VirusTotal, PassiveTotal).
  • Produces actionable tactical and operational cyber threat intelligence products using a variety of internal and external sources that describe trends and shifts in the cyber threat landscape. Briefs key stakeholders on your conclusions.
  • Maintains technical proficiency in the use of tools, techniques and countermeasures.
  • Evaluates tools, services and processes to enhance the team’s threat analysis capability.
  • 3+ years of experience working in a cyber-threat intelligence or analysis function or information security function including but not limited to network operations, threat hunting, malware analysis, forensics, or incident response.
  • Ability to discern patterns of threat actor behavior at the technical level by leveraging multiple resources. Deep understanding of threat actor capabilities, motivations, and tool sets to assess risk.
  • Must possess strong writing, and critical thinking/analysis skills.
  • Must be a self-starter, self-motivated and able to work independently with little oversight in a fast-paced, operationally-focused environment.
  • Technical certifications abilities including GIAC’s GREM and/or GCFA is a plus.
  • Scripting/programming experience (Python, C, C++, Java, etc.) is a plus.
  • Maintains an understanding of the threat intelligence lifecycle.
  • Previous work in financial industry a plus.
If this is a perfect fit, Apply now!