Easter Seals Jobs

Job Information

RedTrace Technologies Inc Cybersecurity Threat Intelligence Analyst - Mid Level (No clearance required) in Washington, District Of Columbia

Company Overview: As a Cybersecurity, Information Technology, and Management Consulting firm focused on assisting our commercial and U.S. Intelligence Community clients proactively mitigate threats, RedTrace Technologies is seeking talented and innovative team members to join us in support of an exciting opportunity with our commercial client.

Position Description:

As a Cybersecurity Threat Intelligence Analyst, you will:

 

  • Leverage the threat intelligence lifecycle and priority intelligence requirements to track threat actors, research cyber threats, conduct analysis and create threat intelligence reporting to support Cyber Intelligence Centre's internal customers

  • Produce a variety of intelligence reporting from technical audiences to the executive level

  • Analyze external technical and non-technical data from various intelligence sources (paid, open and closed) to build threat actor profiles and track threat actor activities both externally and internally

  • Research new and emerging vulnerabilities, threat actor's tactics, techniques, and procedures, and conduct threat hunting within the company’s environment for the presence of related activity

  • Collaborate with members of the Threat Intelligence team on emerging threats, cyber threat actor's activities, targeting and operational tempo

  • Prepare and deliver intelligence briefs to a variety of audiences

     

    Qualifications:

    Required:

  • 5-7 years of CTI experience

  • Past working experience working on a cyber threat intelligence team with experience analyzing, tracking and reporting on nation state, cybercrime and non-state supported threat actors

  • Experience working with the threat intelligence lifecycle and utilizing priority intelligence requirements to drive intelligence operational workflow

  • Experience in leveraging analytic judgement to create high quality intelligence reporting

  • Technical background with internal threat hunting experience and knowledgeable in how threat actors exploit vulnerabilities

  • Technical experience analyzing threat actor's tactics, technical and procedures; malware analysis, network traffic, endpoint activity and vulnerabilities and exploits

  • Leveraging analytic judgement to write high quality intelligence reporting with attention to detail and content that is relevant, accurate and timely

  • Technical analysis skills to analyze internal data and external information to hunt various threats

  • Ability to process and analyze information from multiple data sources, apply analytic judgment and remove bias, and create intelligence products

  • Strong communication skills, both written and verbal, attention to detail and a proven ability to influence stakeholders effectively

    Employee Benefits:

  • Competitive salary for well qualified applicants

  • 401(k) plan

  • Annual performance bonus

  • Certification and advanced degree attainment bonuses

  • Student Loan / Tuition reimbursement

  • Health Care Insurance (medical, dental, vision)

  • Up to four weeks of paid vacation

  • 11 Federal Holidays, and 3 Floating Holidays

  • Team bonding events

    Location:  This position offers a hybrid work schedule (two days per week in the office) and every other Friday off.

RedTrace Technology is an EOE employer.

 

Powered by JazzHR

DirectEmployers