Logo
Intelligence and National Security Alliance

Cyber Threat Analyst

Intelligence and National Security Alliance, New York, New York, us, 10261

Save Job

Minimum qualifications

5 years of experience in an analytical role (e.g., network forensics analyst, intelligence threat analyst, or security engineer/consultant) in a customer facing environment. Experience in stakeholder management (i.e., presenting, reporting) to internal audiences including C-level executives. Experience in managing and executing variable term projects for customers. Preferred qualifications

Experience in evaluating host and network forensic reports of electronic media, packet capture, log data analysis, malware triage, and network devices in support of intrusion analysis or enterprise level information security operations. Experience in the consumption, processing, and analysis of tactical Cyber Threat Intelligence (CTI) within an operational environment, supporting monitoring, detection, and response capabilities. Experience in deploying and analyzing data from technical security controls, to include web proxy, firewalls, IPS, IDS, mail content scanning appliances, enterprise antivirus solutions, network analyzers, and other host-based protection solutions. About the job

As a Cyber Threat Analyst, you will ensure the delivery of actionable intelligence to each customer's security or operational environments in order to drive decision making and decisive action. You will also act as a conduit to an extensive network of cyber security, threat intelligence, and information operations professionals. This is an onsite, client facing position. Google Cloud accelerates organizations' ability to digitally transform their business with the best infrastructure, platform, industry solutions and expertise. We deliver enterprise-grade solutions that leverage Google's cutting-edge technology - all on the cleanest cloud in the industry. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems. The US base salary range for this full-time position is $104,000-$153,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process. Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google. Responsibilities

Evaluate current and emerging tools and best-practices for tracking advanced persistent threats, tools, techniques, and procedures (TTPs) of attacker's motivations, industry, and attacker trends. Perform strategic, tactical, and operational research and analysis of adversarial cyber threats. Correlate intelligence, to develop understanding of tracked threat activity. Present tactical and strategic intelligence about threat groups, the methodologies they use, and the motivations behind their activity. Work with customers to determine their intelligence needs and requirements, and convey both verbally and in writing about the importance of findings for a variety of audiences.

#J-18808-Ljbffr