Threat/Warning Analyst II (8x5 Shift Cycle)

Full Time
San Antonio, TX
Posted
Job description

Finds, analyzes, summarizes, and reports threat warning information and intelligence. Gathers data and threat information from multiple sources. Distills and synthesizes relevant intelligence into cohesive threat assessments. Applies current knowledge of enterprise infrastructure and adversary priorities to contextualize the threat and build prioritized risk estimates. Develops mitigation and countermeasure strategies to undermine adversary activities, defend enterprise infrastructure, data, and systems, while minimizing risk to mission. Provides recommendations to the customer for deployment.

Required Skills

  • Aid in collection and initial processing of threat- and vulnerability-related information from multiple sources.
  • Support classified and open-source research identifying cybersecurity threats to stakeholder infrastructure, data, and systems.
  • Assist developing cyber indicators and signatures derived from gathered information.
  • Aid in report and summary development.
  • Communicate written and verbal information in a timely, clear, and concise manner.
  • Understand, extract, and correlate relevant threat information from multiple sources.
  • Perform advanced research into adversary tactics, techniques, and procedures, capabilities, and priorities.
  • Process, analyze, summarize, and report actionable cyber threat/warning intelligence.
  • Understand and account for customer needs in intelligence reporting and mitigation strategy.
  • Maintain awareness of evolving information sources to incorporate into threat intelligence life cycle.


QUALIFICATIONS
Four (4) years of relevant experience is required. Candidate may substitute a Bachelor’s degree for two (2) experiential years.


CERTIFICATIONS & TECHNICAL PROFICIENCIES
Requires DoD 8570 compliance with CSSP Analyst baseline certification. Information Assurance Technical (IAT) Level I (possess one: A+ CE, CCNA-Security, CND, Network+ CE, SSCP) or Level II (possess one: CCNA Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP) certification. Computing Environment (CE) certification requirement can be fulfilled with either Microsoft OS, Cent OS/Red Hat OS CE certifications. Requires GIAC Cyber Threat Intelligence (GCTI) certification OR Certified Threat Intelligence Analyst (CTIA) certification.

About Black Eagle Defense

Black Eagle Defense is a Maryland-based small business that provides Information Technology, Cybersecurity, and related Consulting Services to the private and public sectors. Our team is composed of highly trained professionals with a commitment to continued learning, versatility, and adaptability within the ever-evolving technological landscape.

We are proud to be an Equal Employment Opportunity and Affirmative Action employer.

colinoncars.com is the go-to platform for job seekers looking for the best job postings from around the web. With a focus on quality, the platform guarantees that all job postings are from reliable sources and are up-to-date. It also offers a variety of tools to help users find the perfect job for them, such as searching by location and filtering by industry. Furthermore, colinoncars.com provides helpful resources like resume tips and career advice to give job seekers an edge in their search. With its commitment to quality and user-friendliness, colinoncars.com is the ideal place to find your next job.

Intrested in this job?

Related Jobs

All Related Listed jobs