Threat Intelligence Job at Openkyber, Maryland

V1Zwa016MmtoRURKQ1BpLzdhNnBEeDZjVlE9PQ==
  • Openkyber
  • Maryland

Job Description

Cyber Threat Intel Analyst (W2 Position) Location: Crownsville, MD (on-site)

Duration: 6+ Months Duties and Responsibilities:

Conduct all-source analysis, digital forensics, and targeted research to identify, monitor, assess, and counter the threat posed by criminal cyber actors. Utilize threat intelligence platforms and tools to mitigate potential threats to users, networks, and data. Respond to computer security incidents in compliance with Information Security Policies and Industry Best Practices. Coordinate the efforts of and provide timely updates to multiple sectors and business units during incident response. Additionally, the candidate will provide security related recommendations to the team as threat events unfold. Provide information and assessments for the purposes of informing leadership and users/customers. Perform network security analysis in support of Intrusion Detection operations including the development and enrichment of indicators used to enhance the network security posture. Contribute to a team of information security professionals analyzing threat data, writing reports, briefing event details to leadership, and coordinating remediation activities across multiple State agencies. Ensures technical security improvements are effective and maintained within configuration management structures. Ensures technology employed by the Security Monitoring Team compliments operational processes. On occasion, provide extended shift coverage with minimal travel required. Monitor various information security related platforms and forums including Recorded Future, Anomali ThreatStream, SANS Internet Storm Center, Krebs on Security, and other forums and mailing lists to stay up to date on current network threats, attack methodologies and trends. Analyze the potential impact of new threats and exploits and communicate risks to relevant leadership and business units. Monitor the State of Maryland networks to find anomalous or malicious activity using various analytical methods and Security Event and Incident Monitoring (SEIM) tools in a fast-paced operational environment.

Education and Years of Experience: Bachelor's Degree in Computer Science/Computer Engineering, Information/Network Security, Cybersecurity, or related field with 5-7 years of related work experience; OR equivalent experience in lieu of degree.

Required Skills & Certifications: Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts-both internal and external to the organization-to leverage analytical and technical expertise. Coursework and previous experience directly related to Cyber Operations environment. Experience with Splunk, ServiceNow, Recorded Future, Anomali ThreatStream, and other cybersecurity tools as required. Ability to work in a team environment ability to taking initiative to understand and master new operating systems, security applications and open-source tools. Knowledge with Windows and Linux operating systems and common applications, working knowledge of and experience in detecting malicious code and methods of infection (ports, attachments, etc.). Knowledge of information systems security concepts and technologies; network architecture and tools; general database concepts; document management; hardware and software troubleshooting; intrusion tools; and open-source alternatives. Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects. Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). Additional Requirements: At least one certification from the CSSP Incident Responder Category (CEH, CFR, CCNA Cyber Ops, CCNA-Security, CHFI, CySA+, GCFA, GCIH, SCYBER, PenTest+)

For applications and inquiries, contact: hirings@openkyber.com

Job Tags

Work experience placement, Shift work

Similar Jobs

Aequor

Associate Scientist Job at Aequor

REPOST OF AMAGJP00015012 Location: Thousand Oaks, CA 100% on-site Schedule: Monday-Friday, standard business hours (8 hours/day) The ideal candidate is an Associate Scientist with hands-on LC-MS experience who is comfortable working in a lab-based environment and supporting...

JND

Sr. JIRA Administrator - Automation Engineer (16458-1) Job at JND

 ...Job Title: Sr. JIRA Administrator - Automation Engineer Job Type: Full-Time, Hourly Bachelor's degree with 10+ years of experience Location ~645 Clyde Avenue, Mountain View, CA Benefits ~ Medical Insurance (Health, Dental & Vision)~401(k)~ Paid... 

GCyber

Intel Analyst Job at GCyber

GCyber is seeking an Intel Analyst, to support our government customer. The Intel Analyst will, apply analysis processes to methods, information security, procedures, and best practices, and advanced technical, research and/or investigative techniques to develop and deliver... 

The UPS Store #0691

Retail Sales Associate - The UPS Store Job at The UPS Store #0691

Retail Sales Associate - The UPS Store (Customer Service, Shipping & Printing)Locations: Multiple openings across Long Island...  ...Why Youll Love Working Here* Consistent hours no late nights (shifts end by 6:30 PM weekdays, 5:00 PM Saturday, 3:00 PM Sunday)... 

Coating Concepts

Customer Service Representative Remote | Full Time Or Part Time | No Experience Required Job at Coating Concepts

We are looking to hire a Customer Service Representative to join our team. You will take responsibility for A Customer Service Representative (CSR) acts as the primary point of contact, providing support, information, and issue resolution to customers via phone, email...