NYC3 Senior Cyber Threat Analyst
If you have any resource which suits the below position, please submit with below details.
Please confirm the billing rate and client name which is mentioned below.
Client : DOITT
Job Title: NYC3 Senior Cyber Threat Analyst
Location: New York,NY 10038
Duration: 26 Months
SCOPE OF SERVICES
The senior analyst will conduct cyber investigations and provide direct operational and intelligence support to network defenders.
? Support incident response efforts with tactically relevant guidance for triaging and forensic analysis as well as analyze and trend previous incident case data
? Provide relevant, timely, and accurate threat intelligence support to network defenders at NYC3
? Scope, direct, and assist intelligence-lead hunt missions in coordination with appropriate groups
? Lead the collection, processing, analysis, and dissemination of raw and finished intelligence to City of New York stakeholders
? Manage operations and improvement of the finished intelligence platform
? Develop and capture strategic intelligence requirements for stakeholders across the City of New York
? Conduct quality assurance for strategic analysis and reporting
? Create and document detailed standard operating procedures and playbooks
? Develop and maintain relationships with various external communities including SLTT, vendors, ISACS, etc.
? Actively research and track geo-political trends, threat actors, malware, and campaigns
? Conduct structured analytic technique exercises
? Minimum 8 years of experience in Threat Management/Cyber Threat Intelligence/Incident Response environment
? Strong understanding of cybersecurity and risk management concepts
? Proficient with all-source intelligence collection and processing – OSINT, Int. Feeds, Tools, Vendor, Partner, Deep Web, etc.
? Excellent verbal and written communication skills
? Previous experience briefing both technical and executive audiences
? Experience tracking and monitoring changes in geo-political events, malware, phishing campaigns, actor TTPs, etc.
? Previous experience vetting intelligence partners and data sources
? Experience capturing and actioning strategic intelligence requirements across a large organization
? Prior experience as a threat intelligence practitioner with a strong understanding of intelligence lifecycle management
? In-depth knowledge of the cyber threat landscape and how to apply attacker motivation, capability and intent to an organizational threat landscape
? Strong working knowledge administering Threat Intelligence Platforms and integrating with Security Appliances, Security Tools, and SIEM solutions
? Ability to translate raw data into actionable intelligence
? Experience performing security assessments and detecting forensic artifacts on host and network-based systems
? Strong knowledge of how malware functions and how vulnerabilities are exploited – ability to apply necessary courses of action