Cyber Intelligence Analyst Job Description
Cyber Intelligence Analyst Duties & Responsibilities
To write an effective cyber intelligence analyst job description, begin by listing detailed duties, responsibilities and expectations. We have included cyber intelligence analyst job description templates that you can modify and use.
Sample responsibilities for this position include:
Cyber Intelligence Analyst Qualifications
Qualifications for a job description may include education, certification, and experience.
Licensing or Certifications for Cyber Intelligence Analyst
List any licenses or certifications required by the position: CEH, CISSP, SANS, IAT, GIAC, II, POC, DODM, SSL, OS
Education for Cyber Intelligence Analyst
Typically a job would require a certain level of education.
Employers hiring for the cyber intelligence analyst job most commonly would prefer for their future employee to have a relevant degree such as Bachelor's and Master's Degree in Computer Science, Intelligence, Cyber Security, Education, Technical, Computer Engineering, Political Science, Information Technology, Engineering, Information Systems
Skills for Cyber Intelligence Analyst
Desired skills for cyber intelligence analyst include:
Desired experience for cyber intelligence analyst includes:
Cyber Intelligence Analyst Examples
Cyber Intelligence Analyst Job Description
- Establish and maintain excellent working relationships/partnerships with the cyber security and infrastructure support teams throughout the Information Technology organization, business unit operation centers
- Advise of the day-to-day activities of the Forensics Laboratory
- Ensure completed requests for service for all requests are received by the forensic laboratory
- Needs to be able to define events vs
- Research, synthesize, and analyze large amounts of data from diverse sources of information with a demonstrated ability to understand articulated stakeholder information needs, anticipate and proactively address unarticulated information needs
- Review and analyze security events, determine their severity, and author reports detailing the activity
- Act as the direct point of contact for Information Security to UPS Operations Command Center (OCC) staff responding to computer security events as directed during core work hours and potentially on-call, after hours, as part of rotational support
- Provide timely follow-up to stakeholders as appropriate and keeps management informed of changes in status during issue resolution
- Analyze cyber security event data with other source data for attack indicators and security incidents
- Provide computer incident response team (CIRT) assistance as need on identified incidents
- Bachelor's degree with 5 years’ experience, or Master’s degree with 3 years’ experience or an additional 4 years of relevant / related work experience may be substituted for the Bachelor’s degree
- Bachelor's degree with 2 years’ related experience, or Master’s degree or an additional 4 years of relevant / related work experience may be substituted for the Bachelor’s degree
- Must have TS/SCI with Polygraph Clearance
- Bachelor’s Degree in an applicable field (Math, Computer Science, Electrical Engineering, ) field and 3 years of continuous professional experience in intelligence analysis or a related field
- Bachelor’s Degree and 9+ years of Intelligence Analysis experience
- Targeting experience within the IC
Cyber Intelligence Analyst Job Description
- Operate the workflow and processes necessary to collect threat intelligence, analyze the data for patterns and actionable information, and create various written intelligence products for GM IT groups to consume
- Provide recommendations to GM IT to increase the overall security posture based on the investigations and lessons learned
- Create threat intelligence products to assist GM IT and Product Cybersecurity in proactively addressing threats to the GM IT and vehicle infrastructure including tactical and strategic threat analysis reports, signatures, malware analysis and threat actor briefings
- Collect, analyze, catalog, and implement malicious indicators of compromise (IOCs) in partnership with CIRT to help refine detection and response efforts
- Collect and manage customer cyber intelligence requirements
- Research threat actors, groups, and events to produce analysis and reporting on threats to key industries
- Conduct online research, interview-based research, and statistical analysis in collaboration with peer technical research teams
- Develop and produce strategic intelligence reports focused on industry-level analysis of developing cybersecurity-related threats, events, conditions, and impacts
- Conduct data analysis to forecast cybersecurity and geopolitical issues
- Research and compile indicators to produce cybersecurity risk indices
- Expertise in cyber threat areas
- OPractice of all-source intelligence analysis
- OCollecting, analyzing and interpreting qualitative and quantitative intelligence from multiple sources for the purposes of documenting results and analyzing findings
- OExperience with Open Source Intelligence (OSINT) Methodologies
- OExperience in geo-political analysis
- OStrong communication skills (both written / verbal)
Cyber Intelligence Analyst Job Description
- Lead strategic projects and develop capabilities to enhance and mature existing cyber threat intelligence functions
- Research and document exploitation tools and threat actor tactics for use by incident responders
- Attend any CIRT Review Board (CRB), Analyst Review Board (ARB), and Engineering Review Boards (ERB) as required
- Provide technical/analytical recommendations for improvement to the CIRT Analyst team
- Work with the Senior Analyst /Senior Engineer to improve metrics for reporting
- Make recommendations/train the analysts to improve reporting
- Assist in indicator reporting
- Working under the guidance of Sr
- Collect, analyze, and disseminate information that meets intelligence requirements
- Participate in information sharing lists and groups to collect and share information meeting intelligence requirements
- Minimum of 11 years’ experience in Intelligence Community, Cyber analysis or Cyber Targeting (Selectors, Monitoring and reporting technical analysis or Counter Intelligence)
- Proficiency in IC datasets and tools for telecommunication analysis such as ICReach, CLIME, Proton, Wrangler, GEMA
- Experience with telecommunication protocols
- Masters Degree or equivalent in in Computer Science, Information Systems, Cyber Security, Computer Engineering, Information Assurance, Mathematics
- Experience supporting HUMINT
- 1+ years of experience gathering intelligence from open-sources, government, industry, and vendor sources
Cyber Intelligence Analyst Job Description
- Maintain and correlate detailed threat actor profiles/groups on adversaries of interest/relevance to the firm, covering tactics, techniques and procedures (TTPs), intent, goals and strategic objectives that could support defensive mitigation and hardening efforts
- Identify, document and share related tactics, techniques and procedures (TTPs) and Indicators of Compromise (IOCs) across all internal/external repositories
- Fuse and analyze all-source information and intelligence to produce quality intelligence products, papers, presentations, recommendations, and findings in support of US government operations
- Leverages advanced investigative skills to initiate pivoting analysis on Threat Intelligence to identify current impact or proactively process mitigations for defense through security technologies and proactive mitigations including zero-day patching identification and anomalous behavior
- Supports junior team members in methods to process tactical mitigations based on results of analysis and determination of threat validity
- Provide remediation support to compromised users, computers or other IT systems
- Contribute to the documentation and development of CIRT processes
- Perform real-time security log and event analysis and takes action within defined parameters to contain and mitigate information security threats and escalate to the next level as needed based on severity
- Assists 1st level SOC Analysts in performing real-time security log and event analysis and incident response duties when needed
- Build and develop a team of cyber intelligence analysts to identify, track and investigate high priority threat campaigns and malicious actors
- Security Tools experience (Firewalls, Intrusion Detection/Prevention Systems, AntiVirus, URL filter)
- 3+ years of experience as a SOC analyst performing threat monitoring and incident response in an enterprise SOC preferred
- Experience with collecting, analyzing, and interpreting qualitative and quantitative data from multiple sources for the purposes of documenting results and analyzing findings to provide meaningful products preferred
- Ability to write high-quality intelligence assessments and briefings for a senior-level audience and technical audiences
- Ability towork in a fast-paced work environment, multi-task, and be comfortable with truncated delivery deadlines
- Must be capable of utilizing information security and monitoring tools
Cyber Intelligence Analyst Job Description
- Maintain contacts in the security and intelligence community
- Drive innovation, and provide thoughtful leadership on current and future cyber security initiatives
- Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations
- Interface with Business Unit and Corporate group leadership to provide an understanding of current threats targeting their environments and what security measures are currently mitigating these threats
- Identify potential solutions to various cyber-related problem set
- Conduct vulnerability analysis on browser and mobile applications
- Participate in the preparation and presentation of operational and technical training (platform and experience-based) for field operators
- Identify and document emerging technology trends that can improve flexibility, security, and reliability
- Investigate architecture solutions for computer threats
- Monitor daily intelligence operations feeds
- Ability to display foreign language proficiency in priority languages, including Arabic, Farsi, Mandarin, Russian, or Turkish-Possession of excellent oral and written communication skills preferred
- Ability to manage and grow intelligence vendor relationships
- Degree in International Relations, Security Studies, Intelligence Studies, Political Science, Regional Studies, Cyber Security, or International Law preferred
- CISSP, CEH, CCIP, GCIH, GPEN, GCIA certifications preferred
- 1+ years of experience in Information Security in a technical capacity and/or intelligence gathering role
- Experience with computer network defense, computer network exploitation and computer network operations