Security

Cybersecurity Threat Intelligence Analyst II

Contract-to-Hire

Brooksource

<< Return to Search Results

Under the direction of the Cybersecurity Incident Response Center Manager, the Cybersecurity Threat Intelligence (CTI) Analyst is responsible for threat identification, monitoring, analysis, and reporting tasks within the organization. 

Serving in a key threat intelligence role, the CTI Analyst will use information collected from a variety of sources to identify, analyze, and report cybersecurity threats that pose or might pose a risk within the enterprise environment in order to protect information, information systems, and networks from threats.

The CTI Analyst develops, implements, and carries out the appropriate activities to identify and recommend mitigations for threats to the environment, maintains a common intelligence picture of the environment to support cybersecurity decision making, researches and reports on developments in novel or evolving threats, supports the investigation of and response to attacks or realized risks, assists with forensics reports, supports the application of protective lessons learned from incidents, and strives to continuously improve threat intelligence processes.

Qualifications:

  • Education: Bachelor’s Degree preferred. Information Technology, Information Systems, Computer Science, Information Security, Information Assurance, or related field of study, military equivalence or a combination of education and hands on work experience equivalence will be considered.
  • Experience: Minimum of 3 years of proven information security experience required; minimum of 3 years customer service experience required.
  • Licenses/Certifications: (CompTIA Security+ or CySA+) and (GCTI or C|TIA or CRTIA or CompTIA CASP+) or equivalent required.

Additional Skills required:

  • Advanced knowledge of computer networking concepts and protocols, and network security methodologies.
  • Intermediate knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • Intermediate knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
  • Advanced knowledge of cybersecurity and privacy principles.
  • Advanced knowledge of cyber threats and vulnerabilities.
  • Intermediate knowledge of specific operational impacts of cybersecurity lapses.
  • Intermediate knowledge of network traffic analysis methods.
  • Advanced knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
  • Intermediate knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
  • Advanced knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
  • Advanced knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).
  • Advanced knowledge of classification and control markings standards, policies and procedures.
  • Advanced knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).
  • Intermediate knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).
  • Advanced knowledge of current computer-based intrusion sets.
  • Advanced knowledge of cyber intelligence/information collection capabilities and repositories.
  • Advanced knowledge of cyber operations terminology/lexicon.
  • Intermediate knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).
  • Intermediate knowledge of evolving/emerging communications technologies, topology, protocols, components, and principles (e.g., application of defense-in-depth).
  • Intermediate knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects.
  • Intermediate knowledge of host-based security products and how those products affect exploitation and reduce vulnerability.
  • Intermediate knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP).
  • Intermediate knowledge of how to extract, analyze, and use metadata in support of continuous monitoring and incident response functions.
  • Advanced knowledge of intelligence disciplines.
  • Advanced knowledge of intelligence preparation of the environment and similar processes.
  • Advanced knowledge of intelligence support to planning, execution, and assessment.
  • Advanced knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions.
  • Intermediate knowledge of malware.
  • Intermediate knowledge of operations security.
  • Advanced knowledge of organizational hierarchy and cyber decision-making processes.
  • Intermediate knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.
  • Intermediate knowledge of the basic structure, architecture, and design of modern communication networks.
  • Intermediate knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).
  • Intermediate knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.
  • Advanced knowledge of the ways in which targets or threats use the Internet.
  • Advanced knowledge of threat and/or target systems.
  • Advanced knowledge of what constitutes a “threat” to a network.
  • Advanced skill in conducting research using deep web.
  • Intermediate skill in defining and characterizing all pertinent aspects of the operational environment.
  • Advanced skill in developing or recommending analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
  • Advanced skill in evaluating information for reliability, validity, and relevance.
  • Intermediate skill in identifying alternative analytical interpretations to minimize unanticipated outcomes.
  • Intermediate skill in identifying critical target elements, to include critical target elements for the cyber domain.
  • Advanced skill in identifying cyber threats which may jeopardize organization and/or partner interests.
  • Advanced skill in preparing and presenting briefings.
  • Advanced skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships.
  • Advanced skill in tailoring analysis to the necessary levels (e.g., classification and organizational).
  • Advanced skill in using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches.
  • Advanced skill in utilizing feedback to improve processes, products, and services.
  • Advanced skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint).
  • Advanced skill in writing, reviewing and editing cyber-related Intelligence/assessment products from multiple sources.
  • Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
  • Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
  • Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes.
  • Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
  • Ability to effectively collaborate via virtual teams.
  • Ability to evaluate information for reliability, validity, and relevance.
  • Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.
  • Ability to focus research efforts to meet the customer’s decision-making needs.
  • Ability to function effectively in a dynamic, fast-paced environment.
  • Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise.
  • Ability to identify intelligence gaps.
  • Ability to recognize and mitigate cognitive biases which may affect analysis.
  • Ability to recognize and mitigate deception in reporting and analysis.
  • Ability to think critically.
  • Ability to think like threat actors.
  • Ability to utilize multiple intelligence sources across all intelligence disciplines.

Additional Skills Preferred:

  • Advanced skill in conducting non-attributable research.
  • Advanced skill in using multiple analytic tools, databases, and techniques (e.g., Analyst’s Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.).
  • Intermediate knowledge of website types, administration, functions, and content management system (CMS).
  • Intermediate knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).
  • Intermediate knowledge of how modern digital and telephony networks impact cyber operations.
  • Intermediate knowledge of human-computer interaction principles.
  • Intermediate knowledge of how modern wireless communications systems impact cyber operations.
  • Intermediate knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).
  • Intermediate knowledge of telecommunications fundamentals.
  • Intermediate knowledge of virtualization products (VMware, Virtual PC).
  • Intermediate knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems.
  • Basic knowledge of general Supervisory control and data acquisition (SCADA) system components.
  • Basic knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity and healthcare.
  • Basic knowledge of cyber defense mitigation techniques and vulnerability assessment tools, including open source tools, and their capabilities.
  • Basic knowledge of cryptography and cryptographic key management concepts.
  • Basic knowledge of penetration testing principles, tools, and techniques (e.g., metasploit, neosploit).
  • Basic knowledge of policy-based and risk-adaptive access controls.
  • Basic knowledge of programming language structures and logic.
  • Basic knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
  • Basic knowledge of key concepts in security management (e.g., Release Management, Patch Management).
  • Basic knowledge of content development.
  • Basic knowledge of system administration, network, and operating system hardening techniques.
  • Basic knowledge of information theory.
  • Intermediate skill in using Boolean operators to construct simple and complex queries.
  • Basic skill in using incident handling methodologies.

Essential functions:

  • Answer requests for information.
  • Provide subject matter expertise to the development of a common operational picture.
  • Maintain a common intelligence picture.
  • Provide subject matter expertise to the development of cyber operations specific indicators.
  • Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.
  • Assist in the identification of intelligence collection shortfalls.
  • Brief threat and/or target current situations.
  • Collaborate with intelligence analysts/targeting organizations involved in related areas.
  • Conduct in-depth research and analysis.
  • Conduct nodal analysis.
  • Develop information requirements necessary for answering priority information requests.
  • Evaluate threat decision-making processes.
  • Identify threats to Blue Force vulnerabilities.
  • Generate requests for information.
  • Identify threat tactics, and methodologies.
  • Identify intelligence gaps and shortfalls.
  • Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets.
  • Monitor and report on validated threat activities.
  • Monitor open source websites for hostile content directed towards organizational or partner interests.
  • Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements.
  • Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
  • Provide subject-matter expertise and support to planning/developmental forums and working groups as appropriate.
  • Provide current intelligence support to critical internal/external stakeholders as appropriate.
  • Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations.
  • Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations.
  • Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations.
  • Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities.
  • Report intelligence-derived significant network events and intrusions.
  • Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up-to-date.
  • Share knowledge, coach and develop others to contribute to continuous improvement of the organization’s cyber-resilience.
  • Creates and improves processes and procedures.

Brooksource provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, national origin, age, sex, citizenship, disability, genetic information, gender, sexual orientation, gender identity, marital status, amnesty or status as a covered veteran in accordance with applicable federal, state, and local laws.

JO-2010-105581