blueStone Solutions Group
Mobile Threat Detection (MTD) Analyst - MID
blueStone Solutions Group, Huntsville, Alabama, United States, 35824
Job Opportunity: Mobile Threat Detection Analyst - MID
Your Overview
Are you ready to delve into the exciting world of mobile threat detection? This mid-level role is perfect for a dedicated Mobile Threat Analyst who will support important tasks like surveillance and compliance, while also being a part of a dynamic team tasked with neutralizing threats in mobile ecosystems. If you have a knack for quick identification and escalation of mobile malware, forensic collections, and integrating security telemetry, we've got the perfect role for you. What You'll Be Doing Contribute to the analysis and identification of mobile threats, such as malware and vulnerabilities. Help create threat intelligence reports based on threat monitoring and investigation. Gain insights into mobile operating systems architecture and mobile app security. Stay informed on mobile threat techniques and develop mitigation strategies. Support the SOC in integrating mobile security data with the organization's MDM system. Ensure mobile devices comply with security protocols and policies. Implement tools to detect anomalies and suspicious activities on mobile devices. Assist in regular assessments of vulnerabilities in mobile applications and devices. The Skills You Bring Understanding of mobile threat vectors, malware, and social engineering tactics. Proficiency in mobile forensics methodologies and cryptographic protocols. Knowledge of legal and ethical implications in mobile threat detection. Active Top-Secret Clearance with SCI Eligibility. Experience with tools like Axiom, MobSF, Splunk, and more. Preferred Certifications GIAC Continuous Monitoring Certification (GMON). GIAC Certified Incident Handler (GCIH). GIAC Certified Forensic Analyst (GCFA). GIAC Certified Intrusion Analyst (GCIA). GIAC Network Forensic Analyst (GNFA). GIAC Mobile Device Security Analyst (GMOB).
If you're eager to protect and support mobile ecosystems against evolving threats, and you have the technical prowess and proactive attitude we're after - this role is your opportunity to shine.
Are you interested? Contact us today to learn more! blueStone Staffing Solutions brings top talent to some of the most desired companies on a contract, contract-to-hire and direct hire basis. We take pride in presenting our candidates with great opportunities they may not have exposure to elsewhere. By working with blueStone, you'll have access to rewarding job opportunities, competitive compensation, and industry leading benefits packages. We look forward to helping you land your next career opportunity and achieve your goals!
Are you ready to delve into the exciting world of mobile threat detection? This mid-level role is perfect for a dedicated Mobile Threat Analyst who will support important tasks like surveillance and compliance, while also being a part of a dynamic team tasked with neutralizing threats in mobile ecosystems. If you have a knack for quick identification and escalation of mobile malware, forensic collections, and integrating security telemetry, we've got the perfect role for you. What You'll Be Doing Contribute to the analysis and identification of mobile threats, such as malware and vulnerabilities. Help create threat intelligence reports based on threat monitoring and investigation. Gain insights into mobile operating systems architecture and mobile app security. Stay informed on mobile threat techniques and develop mitigation strategies. Support the SOC in integrating mobile security data with the organization's MDM system. Ensure mobile devices comply with security protocols and policies. Implement tools to detect anomalies and suspicious activities on mobile devices. Assist in regular assessments of vulnerabilities in mobile applications and devices. The Skills You Bring Understanding of mobile threat vectors, malware, and social engineering tactics. Proficiency in mobile forensics methodologies and cryptographic protocols. Knowledge of legal and ethical implications in mobile threat detection. Active Top-Secret Clearance with SCI Eligibility. Experience with tools like Axiom, MobSF, Splunk, and more. Preferred Certifications GIAC Continuous Monitoring Certification (GMON). GIAC Certified Incident Handler (GCIH). GIAC Certified Forensic Analyst (GCFA). GIAC Certified Intrusion Analyst (GCIA). GIAC Network Forensic Analyst (GNFA). GIAC Mobile Device Security Analyst (GMOB).
If you're eager to protect and support mobile ecosystems against evolving threats, and you have the technical prowess and proactive attitude we're after - this role is your opportunity to shine.
Are you interested? Contact us today to learn more! blueStone Staffing Solutions brings top talent to some of the most desired companies on a contract, contract-to-hire and direct hire basis. We take pride in presenting our candidates with great opportunities they may not have exposure to elsewhere. By working with blueStone, you'll have access to rewarding job opportunities, competitive compensation, and industry leading benefits packages. We look forward to helping you land your next career opportunity and achieve your goals!