Cyber Intel Analyst Resume Samples
4.6
(119 votes) for
Cyber Intel Analyst Resume Samples
The Guide To Resume Tailoring
Guide the recruiter to the conclusion that you are the best candidate for the cyber intel analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.
Craft your perfect resume by picking job responsibilities written by professional recruiters
Pick from the thousands of curated job responsibilities used by the leading companies
Tailor your resume & cover letter with wording that best fits for each job you apply
Resume Builder
Create a Resume in Minutes with Professional Resume Templates
CHOOSE THE BEST TEMPLATE
- Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS
- Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES
- Instantly download in PDF format or share a custom link.
DS
D Schimmel
Dorothea
Schimmel
26665 Katelyn Squares
Phoenix
AZ
+1 (555) 450 8039
26665 Katelyn Squares
Phoenix
AZ
Phone
p
+1 (555) 450 8039
Experience
Experience
Detroit, MI
Cyber Intel Analyst
Detroit, MI
Pagac-MacGyver
Detroit, MI
Cyber Intel Analyst
- Provides technical input to the Engineer Research & Development Center (ERDC) and DoD Security Resource Center (DSRC) Security team
- Assist with Incident Response
- Providing digital forensics support to Corporate Investigations and Counter-Intelligence operations
- Leidos is a global leader in the integration and application of information, technology and systems working to solve the world's toughest challenges in the civil, health, defense, intelligence and homeland security markets. The company's 33,000 diverse employees support vital missions for government and commercial customers in 30 countries. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $10 billion for the fiscal year ended January 1, 2016 after giving effect to the recently completed combination of Leidos with Lockheed Martin's Information Systems & Global Solutions business (IS&GS). For more information, visit www.Leidos.com. The company's diverse employees support vital missions for government and commercial customers. Qualified women, minorities, individuals with disabilities and protected veterans are encouraged to apply. Leidos is an Equal Opportunity Employer
- Assist lead analyst with tracking CIRT metrics
- Leidos is a global leader in the integration and application of information, technology and systems working to solve the world’s toughest challenges in the civil, health, defense, intelligence and homeland security markets. The company’s 33,000 diverse employees support vital missions for government and commercial customers in 30 countries. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $10 billion for the fiscal year ended January 1, 2016 after giving effect to the recently completed combination of Leidos with Lockheed Martin's Information Systems & Global Solutions business (IS&GS). For more information, visit www.Leidos.com. The company’s diverse employees support vital missions for government and commercial customers. Qualified women, minorities, individuals with disabilities and protected veterans are encouraged to apply. Leidos is an Equal Opportunity Employer
- Analysis of security logs including data acquisition, data cleaning, and network analysis
Philadelphia, PA
Cyber Intel Analyst Mgr
Philadelphia, PA
Hagenes, Wiegand and Luettgen
Philadelphia, PA
Cyber Intel Analyst Mgr
- Provide metrics for operational effectiveness and efficiency in order to drive investment and staffing decisions
- Ongoing Security Information and Event Management ticket prioritization and tasking
- Computer network defense incident response
- Oversight of knowledge management practices and analytical completeness
- Driving efficiencies into operational workflows
- Directing actions in response to security events and network activity
- Coordinating resource priorities and workloads across teams with alignment to tactical and strategic objectives
present
Chicago, IL
Cyber Intel Analyst Asc
Chicago, IL
Lueilwitz LLC
present
Chicago, IL
Cyber Intel Analyst Asc
present
- Maintaining professional knowledge of trends in computer and network vulnerabilities and exploits
- Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics
- Development of thorough incident reports
- Enterprise SIEM platforms (e.g. Nitro/McAfee Enterprise Security Manager, ArcSight, QRadar, LogLogic, Splunk)
- Incident handling (guiding customers, directing resources through intelligence-based response process)
- Delivering threat awareness and education briefings
- Forensic analysis (analysis of compromised machines)
Education
Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Harvard University
Bachelor’s Degree in Computer Science
Skills
Skills
- Understanding of the Portable Executable (PE) format, and parsing of non-standard text file formats
- Motivated self-starter with strong written and verbal communications skills, and the ability to create complex technical reports on analytic findings
- Knowledge of and ability to navigate and manipulate the Windows registry
- Strong organizational skills and ability to multi-task
- Ability to learn quickly
- Demonstrated self-starter and team player with ability to quickly learn new concepts with guidance from senior team members
- Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings
- Knowledge of OSINT tools and techniques
- Experience and proficiency with any of the following: Anti-Virus, HIPS, IDS/IPS, Full Packet Capture, Host-Based Forensics, Network Forensics
- (ISC)² Certified Information Systems Security Professional (CISSP)
5 Cyber Intel Analyst resume templates
Read our complete resume writing guides
1
Cyber Intel Analyst Resume Examples & Samples
- Serves as a primary member of the Cyber Threat Center (CTC) by acting as the proactive arm of cyber network defense activities being carried out on a daily basis in a fast paced environment
- Responsible for the ingestion of cyber intelligence (CI) from various feeds and working groups, along with the dissemination of CI internally to maintain situational awareness across the sub-units of the CTC
- Understand adversary tactics and create detective signatures for those techniques
- Track adversaries’ evolution over time
- Has reporting and research responsibilities
- Is able to adjust to the dynamic nature of threats and shift priorities to assess situations as they occur in the world and understand how they impact the firm’s cyber security posture
- B.S. in Computer Science, MIS, or related degree and a minimum of three (3) years of related experience in Information Security or combination of education, training and experience. Preferred experience includes a minimum of two (2) years of security and intelligence studies and three (3) years of experience with cyber intelligence or information operations
2
Cyber Intel Analyst Resume Examples & Samples
- Technical understanding in the following areas: network communication using TCP/IP protocols, basic system administration, basic understanding of malware (malware communication, installation, malware types), intermediate knowledge of computer network defense operations (proxy, firewall, IDS/IPS, router/switch, open source information collection
- Strong analytical and research skills with an extensive understanding of classified research tools and websites
- Ability to write detailed and comprehensive cyber intelligence analytical products in a team environment
- Ability to present analysis to large groups on a weekly basis
3
Cyber Intel Analyst Resume Examples & Samples
- Hold DoD-8570 IAT Level 2 baseline certification (Security+ CE, CISSP or equivalent) with ability to achieve CND-A certification (CEH, GCIA) within 6 months
- Hold and maintain an active Top Secret clearance
- Demonstrated understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements
4
Cyber Intel Analyst Asc Resume Examples & Samples
- Participate in the coordination of resources during incident response efforts
- Provide technical assistance as requested or directed by WHCA or its mission partners
- Perimeter Defense
- Strategic Planning Analysis
5
Cyber Intel Analyst Resume Examples & Samples
- CND-A certification (CEH, GCIA or equivalent) within 180 days of assignment
- Demonstrated strong operational expertise in one or more of the following CND tools: Splunk, Palo Alto, Network Firewalls, SourceFire/Cisco IPS, BRO, FireEye, AirTight and Solera
- Risk Analysis and Readiness
6
Cyber Intel Analyst Resume Examples & Samples
- Ability to apply formal intelligence analysis methods, develop hypothesis, prove/disprove relationships, always ask why, defend your analysis, and apply attribution to cyber threat activity
- Prepare detailed analysis reports, products, cyber threat assessments, and briefings of security incidents. Establishes criteria and assesses potential impacts of intrusions
- Demonstrated English writing and presentation ability. Writing samples may be required
- Demonstrated expertise using I2 Analyst Notebook or other comparable visualization tool
7
Cyber Intel Analyst Resume Examples & Samples
- Demonstrated experience programming in x86 Assembly, C/C++/C#
- Strong software development skills
- Strong understanding of networking concepts
- Ability to develop scripts using Python
- Understanding of the Portable Executable (PE) format, and parsing of non-standard text file formats
- Experience with debugging
- Excellent writing and communication skills
- Active Top Secret clearance with eligibility for SCI
- Department of Defense Basic Digital Forensic Examiner certification or eligibility to take and pass the exam with 1 year from the date of hire
- Able to analyze disassembly of x86 and x64 binaries
- Mobile IOS/Android
8
Cyber Intel Analyst Resume Examples & Samples
- Effective analytical and critical thinking skills - proven problem solving and follow-thru
- Ability to foster new ideas/concepts and generate synergy with the team, positive, team and mission-oriented attitude, self-motivate when given strategic goals
- Ability to lead others and deliver results (brief leadership, customers, etc.)
- Familiarity with Advanced Persistent Threat (APT) activity; Offensive attack hacker mindset
- Familiarity with Information Security practices
- Knowledge of OSINT tools and techniques
- Practical experience with UNIX based and Windows operating systems
- Demonstrated proficiency in development of applications, custom tools, and solutions in various coding languages to include SQL, python, Django, perl, ruby, PHP, Java, etc
9
Cyber Intel Analyst Resume Examples & Samples
- Must have 6 years of professional experience
- Must have at least 4 years of applicable experience in the field of Information Assurance, network and systems CND
- Minimum industry certifications: Security+, CEH , CCNA or MSCA
- Fuse IA-CND threat information and intelligence from various sources, to provide predictive warning, threat analysis, and course of action recommendations, in support of current and long-term network defense/defensive information operations, information assurance, network security engineering and collaboration with the information operations community of interest
- Produce formal and informal reports, give briefings, and provide perspectives of the behavior of adversaries against target systems, technologies, operations, and missions of the DOD
- Support IA-CND planning, current operations, and security engineering activities of the IA Branch
- Coordinate and recommend courses of action in response to incidents/events based on related intelligence to mitigate/eliminate threats and attacks
- Produce of intelligence reports and products
- Experience with various network security applications and techniques, including firewalls, intrusion detection systems, virtual private networks, encryption techniques and disaster recovery systems
- Experience in incident response, information assurance process and procedures and CND
- Must have ability and willingness to work flexible hours
- Active DOD Top Secret (Desired w/SCI Eligibility)
- Education: Bachelor of Science preferably in Intelligence, Computer Science or Criminal Justice and four (4) years direct experience in the field or minimum six ( 6) direct experience
- Specialized Experience Desired: Cyber Intel working experience with the ability to translate traditional Intelligence reporting into cyber threat alerting and analysis
- Experience with multiple Operating Systems – Windows, Linux/Unix in desktop and server
- Industry certifications: GCIH or GCIA, CCNP and/or MCITP
10
Entry Level Cyber Intel Analyst Code Development Resume Examples & Samples
- Platforms: Windows, Linux, Mac, or Mobile (iOS, Android)
- Programming languages: Python, C, C++, or Assembly
- Ability to obtain TS/SCI
- Knowledge of and ability to navigate and manipulate the Windows registry
11
Cyber Intel Analyst Resume Examples & Samples
- Demonstrated understanding of TCP/IP, common networking ports and protocols, traffic flow, systems administration, OSI model, defense-in-depth, and common security elements
- CND experience (Protect, Detect, Respond, and Sustain) within a Computer Incident Response organization
- Demonstrated hands-on experience analyzing high volumes of logs, network data (e.g. Netflow, Full Packet Capture), and other attach artifacts in support of incident investigations
- UNIX/LINUX command line experience
12
Cyber Intel Analyst Resume Examples & Samples
- Experience developing in Python, C, C++, and/or C#
- Capable of Python scripting to automate analysis and reverse engineering tasks
- Understanding of x86, ARM, and x64 architectures
- Strong understanding of Windows Operating System Internals and Windows APIs
- Understanding of the PE file format and experience parsing structured or unstructured data
- Strong initiative, problem solving and critical thinking skills
13
Cyber Intel Analyst Resume Examples & Samples
- Experience working in and building SOC/SIC environments
- Strong background in incident response and network based forensics, log analysis, correlation
- SIEM Tool implementation, usage, and management such as splunk, trustwave, arcsight
- Python Scripting
- Splunk Subject Matter Expertise
- Implementation of mass storage solutions and high bandwidth log and traffic capture
- Experience with enterprise vulnerability scanning solutions and deployments
- Experience with HBSS and IDS tools
14
Senior Cyber Intel Analyst Resume Examples & Samples
- Position typically requires 12-15 years of related experience
- Advanced NETFLOW and PCAP Analysis
- Experience using COTS/Open Source tools: Novetta Cyber Analytics, Mitre ChopShop and/or ARL DSHELL
15
Cyber Intel Analyst Asc Resume Examples & Samples
- Enterprise SIEM platforms (e.g. Nitro/McAfee Enterprise Security Manager, ArcSight, QRadar, LogLogic, Splunk)
- Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics
- Lockheed Martin's Intelligence Driven Defense and/or Cyber Kill Chain methodology
- Experience analyzing high volumes of logs, network data (e.g. Netflow, FPC), and other attack artifacts in support of incident investigations
- Linux and basic Linux commands
- Mobile technology and OS (i.e. Android, iOS, Windows)
- Understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements
- DoD-8570 level 1 certification is preferred
16
Cyber Intel Analyst Resume Examples & Samples
- Focus on risk-based solutions that prioritize threats, risks, and vulnerabilities
- Integrate robust, seamless, and end-to-end defense solutions
- Leverage pattern recognition and predictive analysis to identify and prevent otherwise unknown threats
- Protect core process functionality, even during an active attack
- Providing digital forensics support to Corporate Investigations and Counter-Intelligence operations
- Developing and maintaining detections for insider threat activities
- A Bachelor's degree or equivalent training or experience in an appropriate field, such as digital forensics, computer science, information technology, or other applicable area
- Minimum of 3-5 years of work experience
- Work experience in digital forensics and incident response
- Familiarity with Windows, UNIX and Linux operating systems
- Demonstrated experience building scripts and detections utilizing different programming languages (Python, Perl, YARA, Powershell)
- Demonstrated experience and proficiency with multiple forensic tools and security applications (EnCase, FTK, Cellebrite, SANS SIFT, Intella, Volatility, RegRipper, ArcSight)
- Ability to obtain and maintain appropriate DOD security clearance
- Demonstrated effective organizational, technical, customer service, and teaming skills
- Strong verbal and written communication skills. Candidate must be able to effectively convey ideas and analysis findings to investigators, senior management, team members, and other people throughout the company as a Subject Matter Expert
- Demonstrated problem solving skills and self-starter work style
17
Cyber Intel Analyst Mgr Resume Examples & Samples
- Minimum of 7 years of experience in designing, deploying, and maintaining security solutions
- Minimum of 5 years of IT management experience
- Current DoD Secret clearance; ability to obtain DoD Top Secret clearance within reasonable timeframe
- One of the following active security certifications: CAP, CASP CE, GSLC, CISM, or CISSP
- Experience developing and implementing system security plans
- Strong communication skills (both written and verbal) and customer service skills
18
Cyber Intel Analyst Resume Examples & Samples
- Experience with Cyber Security
- Experience with Risk Management Framework (RMF)
- Working Knowledge of Kerberos, Experience with DoD 8500.1,, DoDD 8500.2, DoD 5200-r,, and DoD 8570, Conducting Security Audits
- Working Knowledge of IAVA,
- Strong Customer Service and, Interpersonal Skills
- Provides technical input to the Engineer Research & Development Center (ERDC) and DoD Security Resource Center (DSRC) Security team
- Ensures HPC support systems meet the DOD system security configuration requirements
- Provides security systems engineering systems software support and technology assessments related to system software or architecture for a high performance computing center
- Assists systems personnel in providing security problem resolution assistance to User Support as required
- Develops H/W, S/W, and communications security procedures and documentation and acceptance testing of security modules, subsystems, and total systems
- Conducts systems security auditing to ensure systems security integrity, to ensure access is limited to only authorized (registered) users of the DSRC
19
Cyber Intel Analyst Resume Examples & Samples
- Support AF, 24 AF, COCOMS and their subordinate operational units with the development of enabling concepts, operating concepts, cyber requirements, papers, briefings designed to communicate operational community needs, gaps and intent of its stakeholder's requirements for non-material CWO capabilities
- Assist squadron Information Operations mission by providing support to AF, 24 AF, COCOMS and their subordinate operational units with the development of enabling concepts, operating concepts, Joint Reconnaissance Center (JRC) requirements, papers, briefings designed to communicate operational community needs, gaps and intent of its stakeholders requirements for non-material Initial Response Capabilities (IRC)
- Support of the creation and update of applicable unit training processes to include initial/mission qualification training (IQT/MQT), standardization and evaluation (Stan/Eval) as well as continuation training (CT) for unit supported Mission Design series (MDS) weapons platforms
- Coordinate CNO related information needs with NAF and field units in accordance with Wing, NAF, USAF and DoD directives
- Assist in authoring, editing or reviewing reports, briefings to include stand-up preparation and country studies, long term intelligence and special topics analysis
- Satisfy Requests for Information (FRI) submissions in support of 688 CW subordinate units
- Support Wing Exercises
- Knowledge of and research of classified intelligence community reporting databases and interfaces across NSANet, JWICS, SIPRNet, and NIPRNet
- Knowledge of open-source research capabilities regarding cyberspace threat information
- Knowledge of and/or prior experience or basic knowledge of the CYBERCOM and/or 24 AF architecture
20
Cyber Intel Analyst Resume Examples & Samples
- Applies more complex computer investigation and analysis techniques in the interests of determining potential security problems and to provide data recovery services for users. Researches best practices and makes recommendations for new tools and procedures as appropriate
- Discovers files on the subject system including existing normal files, deleted yet remaining files, hidden files, password-protected files, and encrypted files. Recovers discovered and deleted files to ensure that company information retained
- Identifies evidence when computers systems and networks are used in the commission of crimes or in the abuse of company policies
- Microsoft Certified Systems Engineer (MCSE) and Information Systems Security Professional (ISSP) certifications preferred
- Seven or more years of experience in computer forensic analysis
- Experience working with a wide range of computer hardware and software
- Experience working with computer forensics software and hardware
- Experience working with legal policies and procedures
- Good Presentation skills to present test results to individuals and groups
- Ability to keep sensitive and confidential material private
21
Cyber Intel Analyst Resume Examples & Samples
- Analysis of security logs including data acquisition, data cleaning, and network analysis
- Scripting, customization, and light application development within SIEMs (Splunk, etc.)
- Digital Forensics and investigations
- HR/Legal/Ethics investigations with digital evidence
- Insider Threat search/query design involving very large security datasets
- Organization and manipulation of medium to very large data sets
- Create written reports, dashboards, and visualizations
- Analyze data for trends, statistical patterns, and intelligence
- Develop security use-cases for Insider Threat activity and malware behavior
- Incident and alert response
- Bachelor's Degree in Computer Science, Data Science, Information Systems, or other related field, or equivalent work experience of at least 2+ years of documented Information Security or Data Analytics experience
22
Senior Cyber Intel Analyst Resume Examples & Samples
- Maintain, develop, and continually evaluate cyber intelligence sources (technical & non-technical) to increase effectiveness and timeliness of reporting threat information
- Perform as primary subject matter professional for the gathering, evaluating, authoring and presentation of various assessments/analysis of intelligence as it may pertain to cyberspace operations
- Provide operational intelligence analysis, training and operational support to Department of Defense (DOD) operators and senior decision makers by gathering, processing and analyzing open-source/all-source cyber intelligence
- Position typically requires 10-12 years of related experience
- Strong technical skills proficiency in the following areas: network communication using TCP/IP protocols, basic system administration, basic understanding of malware (malware communication, installation, malware types), intermediate knowledge of computer network defense operations (proxy, firewall, IDS/IPS, router/switch) and open source information collection
- Candidate must have a thorough understanding of Domain Name Service records
- Strong proficiency and recent experience (within last 3 years) performing NETFLOW and PCAP analysis using common analysis tools (examples include Wireshark, Splunk, ChopShop, Dshell, Network Miner, Moloch, etc)
- Candidate must be strongly proficient at sessionizing PCAP data, identifying and decoding protocols, extracting files, and applying standard filters such as Berkley Packet Filter (BPF)
- Intermediate ability to build intrusion related data visualizations and perform analysis (i.e., using I2 Analyst Notebook, Netviz, Palantir, etc
- Intermediate ability to present technical information and analysis to groups up to 50 persons on a quarterly basis
- Candidate will be required to brief smaller groups up to 10 persons on a weekly basis
- Formal training as an intelligence analyst in any discipline – graduate of US Govt intelligence analysis course: CAC, IBC,
- Kent School, IC 101, Analysis 101, Army, Navy, Air Force, etc
23
Cyber Intel Analyst Resume Examples & Samples
- BS/BA with 5 to 7 years experience
- Strong proficiency in report writing
- Self-starter with the ability to proactively engage and develop relationships with intrusion set subject matter experts and analyst counterparts across the US Intelligence and Law Enforcement communities
24
Cyber Intel Analyst Asc Resume Examples & Samples
- Development of thorough incident reports
- Adherence to the highest standards of ethical and professional conduct
- With computer security concepts and best practices
- With networking, system administration and security best practices
- Using Unix/Linux operating systems including command-line tasks and scripting
- Writing formal reports and other technical documentation
- With analyzing and investigating computer network intrusions
- With malware analysis
- With conducting data analysis
- Experience providing enterprise incident handling support
- Experience using Digital Forensics techniques and tools (Encase, FTK, File Systems)
- Experience performing forensic analysis tasks (Intrusions and/or Incident response)
- Experience with Cyber Kill Chain and Intelligence Driven Response
- Experience with Reverse Engineering of malware
25
Cyber Intel Analyst Resume Examples & Samples
- Windows development experience (C, C++, Python)
- Understanding of Windows DLLs, APIs, and drivers
- Ablility to navigate and control Windows networking stack
26
Cyber Intel Analyst Resume Examples & Samples
- Analyze all intelligence reports
- Enter indicators into system
- Perform analysis on new indicators to detect prior compromise
- Mitigate new indicators within the SIEM
- Keep the analyst team informed of major developments in the attacker landscape
- Collaborate across Leidos Cyber teams for early warning of developing trends
- Assist with Incident Response
- Group Mailbox Monitoring
- Perform triage and investigation of user-reported emails
- Assist level 1 analysts with developing their incident triage and analysis skills
- Backup Team Lead
- Perform team lead duties, track CIRT actions, conduct daily CIRT tag-up when Lead analyst is unavailable
- Metrics Tracking
- Assist lead analyst with tracking CIRT metrics
- Review analysis within to ensure that other analysts are conducting thorough and sound investigations
27
Cyber Intel Analyst Resume Examples & Samples
- Remain flexible in an environment where priority may change as customer needs require
- At least 2 years of software development experience
- Experience working on Linux or Unix platforms
28
Cyber Intel Analyst Resume Examples & Samples
- Currently enrolled in a four year accredited college or university
- Strong interest in Computer Technologies, Microsoft Technologies and Solutions, Cyber Security and/or Information Assurance
- Works well on a team
- Strong written/verbal communication
29
Cyber Intel Analyst Resume Examples & Samples
- Certifications: Security+
- Demonstrated understanding of cyber advanced persistent threats, actors, infrastructure, and TTPs
- Analyst experience in Federal Cyber Center (NTOC, IC-SSC, CYBERCOMMAND, NCIJTF, US-CERT) or Corporate CIRT
- Hold one or more of the below certifications
- SANS GIAC GCIH - GIAC Certified Incident Handler
- CompTIA Linux+
- EC-Council Certified Ethical Hacker (CEH)
- EnCase Certified Examiner (EnCE)
30
Cyber Intel Analyst Mgr Resume Examples & Samples
- Effectively coordinate across Mission Task Areas to establish agreed to priorities, properly allocate resources, and create accountability to deliver results
- Daily oversight of intrusion analysis and response activities
- Ongoing Security Information and Event Management ticket prioritization and tasking
- Directing actions in response to security events and network activity
- Computer network defense incident response
- Driving efficiencies into operational workflows
- Oversight of knowledge management practices and analytical completeness
- Ensuring close loop remediation and hardening across the enterprise
- Advanced Threat Campaign Development
- Engage with the external cyber community to build collaborative relationships and drive thought leadership
- Delivering resilient detections and countermeasures to stay ahead of the adversary and protect the enterprise computing environment
- Provide metrics for operational effectiveness and efficiency in order to drive investment and staffing decisions
- Making and driving balanced risked based decisions across the enterprise
- 6 to 8 years of computer network defense experience
- 3 to 5 years of proven leadership experience
- Working technical knowledge of computer network environments
- Demonstrated background in computer network defense tools, processes, and tradecraft with knowledge in a broad spectrum of technologies including tap and aggregation, intrusion detection systems, security information and event management, and forensic tools confirmed by related work experience
- Demonstrated effective organizational and team building skills
- Demonstrated ability to build and foster collaborative team environments
- Proven ability to build effective relationships
- Experience researching and developing host and network-based security technologies, machine learning algorithms, and detection methods
- Experience creating customized security log analysis and detection capabilities using programming and development expertise, including Java, Python, Shell scripting, and regular expression
- Systems engineering and architecture experience
- Experience with executive level interaction
- Demonstrated commitment to outstanding customer service
- Current active TS/SCI access
31
Cyber Intel Analyst Asc Mgr Resume Examples & Samples
- Daily oversight of Countermeasures and Initiatives activities and tasks
- Identification and tracking of proposed initiatives and priorities
- Ongoing prioritization, tasking, and resourcing of projects and initiatives
- Delivering results through the adherence of agreed to prioritization
- Establish and execute effective practices for balancing rigor and agility
- Establish and execute business rhythms for status tracking and reporting
- Obtain solid understanding of enterprise program objectives and resource needs
- Driving cross enterprise collaboration to enable delivery of effective and efficient solutions
- Consistent and effective communication across the organization and at all levels of leadership and contributors
- Managing priorities and workloads with established accountability to deliverables
- Enable the workforce through mentoring, skill development, and empowerment
- Coordinating resource priorities and workloads across teams with alignment to tactical and strategic objectives
- Ability to obtain and maintain a DoD clearance
- 3 to 5 years of computer network defense experience
- 2 to 4 years of proven leadership experience
- Demonstrated thought leadership in the field of cyber security with the ability to deliver innovative solutions
- Demonstrated excellence in verbal and written communication skills
- Deep understanding of business acumen and adherence to the highest standards of ethical and professional conduct
- Demonstrated experience developing and executing tactical objectives and strategic goals
- Comfortable working in large corporate environments
- Proficient in Program Management Core Body of Knowledge
- Proficient in System Development Lifecycle Methodologies
- Experience with SPLUNK Enterprise and Enterprise Security (ES)
- Knowledge of DoD SCIF, lab, and network security policies and protocols
- Proficiency in Unix/Linux command line
- Proven experience leading highly effective global teams
32
Cyber Intel Analyst Resume Examples & Samples
- Perform surveillance and reconnaissance, enclave cyber security defensive, attack vector analysis, Computer Network Defense (CND), incident handling, vulnerability management/reporting, risk analysis and readiness and strategic planning analysis
- Provide technical assistance as requested or directed by mission partners
- Attack Vector Analysis
- Vulnerability Management/Reporting
33
Cyber Intel Analyst Resume Examples & Samples
- Conduct risk analysis and management activities for the AF-CCE environment
- Provide incident reports, summaries, and other situational awareness information to required parties
- Conduct incident (e.g., coordinate documentation, work efforts, resource utilization within the organization) from inception to final remediation and after action reporting
- Conduct threat or target analysis of CND information and production of threat or target information within the network or enclave environment
- Conduct the monitoring of external CND data sources to maintain enclave
- Experience working with DoD customers on large scale enterprise contracts
- Domain knowledge and customer intimacy with the Air Force customer and the GCSS AF solution set
- ITIL Foundation certification or experience with ITIL processes
- Active TS/SSBI clearance or higher
34
Lead Cyber Intel Analyst Resume Examples & Samples
- Incident Handling
- CND experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization
- Experience and proficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics
35
Cyber Intel Analyst Resume Examples & Samples
- Lead risk analysis and management activities for the AF-CCE environment
- Manage threat or target analysis of CND information and production of threat or target information within the network or enclave environment
- Manage the monitoring of external CND data sources to maintain enclave situational awareness
- Interface with external organizations to ensure appropriate and accurate dissemination of incident and other CND information
- Track compliance audit findings, incident after-action reports, and recommendations to ensure appropriate mitigation actions are taken
- Provide the customer with technical support, analysis, and recommendations. - Provide technical assistance as requested or directed by the AF-CCE program office or its mission partners
- Strategic Planning Analysis Filling to perform shift work, if required
- Advanced audit analysis of CND tools
- DoD-8570 IAM Level 2 baseline certification (CAP or GSLC or CISM, or CISSP)
- Experience coaching and leading IT engineers
- Demonstrated understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, Open Systems Interconnection (OSI) model, defense-in-depth and common security elements
- Active Secret clearance with SSBI or higher
- CND-certification (CEH or GCIA or GCIH)
36
Cyber Intel Analyst Resume Examples & Samples
- Maintain threat indicators within the threat intelligence platform
- Implement and support standard procedures for incident response
- Interface with Business Unit Information System Security Officers and Incident Response Teams
- CERTIFICATIONS: (One or more required) CISSP, CISA, CISM, GIAC, RHCE
- CLEARANCE: Must be able to obtain a Position of Public Trust Designation - US Citizen or Green Card Holder. Willingness to submit to a Tier 5 Single-Scope Background Investigation (SSBI)
- Ability to communicate effectively both written and verbal
37
Senior Cyber Intel Analyst Resume Examples & Samples
- The responsibilities of the candidate will vary depending on the tactical and strategic needs of the services and clients and will regularly include
- Monitoring client networks for signs of adversarial activity
- Respond to alerts from various monitoring systems and platforms
- Triage potentially malicious events to determine severity and criticality of the event
- Analyze network traffic using a variety of analysis tools in support of service objectives
- Analyze malicious artifacts obtained from network monitoring with a focus on generation of threat intelligence and service improvement
- Identify, develop, and implement new detections and mitigations across the services platforms
- Communicate and collaborate with the analyst team for situational awareness
- Communicate threat information with clients accurately and professionally through formal and informal interactions
- Apply structured analytical methodologies to maximize threat intelligence growth and service efficacy
- Directly contribute to the continued technical enhancement of the services platforms, analysis tradecraft, and development of team skills and expertise
- Contribute to the continued evolution of services capabilities and processes
- Technical degree, or equivalent experience
- 2-5 years of technical experience supporting enterprise-scale Computer Network Defense (CND), monitoring, analysis, or threat intelligence missions
- Hands-on experience with network and host monitoring platforms, technologies, and tools including Vortex, Suricata, LaikaBOSS, Snort, Bro, or others
- Experience applying structured analytical frameworks, e.g. LM Cyber Kill Chain®, The Diamond Model, LM Intelligence Driven Defense®, Pyramid of Pain, etc
- Experience developing detections using common network defense platforms/tools (Yara, Snort, etc)
- Strong written and verbal communication skills, proven ability to communicate technical topics to diverse audiences
- Functional knowledge of at least one scripting languages (Python, perl, bash, etc)
- Proficiency with Linux CLI tools (awk, sed, jq, etc)
- Technical mentoring, coaching, or training
- Experience developing security and analysis tools using Python, Bash, JSON (jq), and other technologies
- Experience creating or delivering technical training materials and programs to support network and host forensics, malware analysis, and other technical analyst skills
- Experience with visualization platforms and technologies as they apply to threat intelligence analysis
- Experience communicating with external parties on technical and non-technical security topics (blogs, whitepapers, webinars, conference presentations, client briefings)
- Experience evaluating, implementing or integrating Commercial and Open Source security tools