Cyber Intelligence Analyst Resume Samples

4.5 (120 votes) for Cyber Intelligence Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the cyber intelligence analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
JG
J Grant
Jaylon
Grant
6076 Bogan Stream
Phoenix
AZ
+1 (555) 671 8491
6076 Bogan Stream
Phoenix
AZ
Phone
p +1 (555) 671 8491
Experience Experience
New York, NY
Cyber Intelligence Analyst
New York, NY
Walker-Lueilwitz
New York, NY
Cyber Intelligence Analyst
  • Develop strategies to leverage existing infrastructure to enhance the defense-in-depth of the Marine Corps networks
  • Develops intelligence products and performs expansive cyberspace intelligence analyst duties
  • Contributes to the development of intelligence products and performs a vast array of cyberspace intelligence analyst duties with no guidance
  • Provides leadership for successful project completion by identifying risks and developing/recommending mitigation strategies
  • Contributes to the development of intelligence products and performs cyberspace intelligence analyst duties with minimal guidance
  • Ensures technical security improvements are effective and maintained within configuration management structures
  • Participate in weekly TSA Network Intrusion Working Group meetings
Philadelphia, PA
Multi Source Cyber Intelligence Analyst
Philadelphia, PA
Stehr LLC
Philadelphia, PA
Multi Source Cyber Intelligence Analyst
  • Assist in the coordination and direction of all activities outlined in the proposal
  • Assist in the formulation and enforcement of standards, the assigning of schedules, supervising team members, communicating policies and intent, and insuring that tasks are implemented in a timely manner
  • Organize and contribute to the writing and briefing a range of cyber intelligence related products and support the production of multi-source cyber intelligence products
  • Conduct technical/cybersecurity focused analysis by initiative or in response to identify threats to the client’s operational environment and its enterprise activities
  • Collaborate effectively and efficiently within a small, hybrid team
  • Coordinate with and provide expert technical support to enterprise-wide Computer Network Defense technicians to resolve Computer Network Defense incidents
  • Coordinate with and provide expert technical support to Computer Network Defense technicians to resolve Computer Network Defense incidents
present
San Francisco, CA
Senior Cyber Intelligence Analyst
San Francisco, CA
Satterfield-Douglas
present
San Francisco, CA
Senior Cyber Intelligence Analyst
present
  • Lead strategic projects and develop capabilities to enhance and mature existing cyber Intelligence functions
  • Write intelligence and technical articles for knowledge sharing
  • Identifies gaps in intel gather strategy and leads changes in covering identified gaps
  • Support mid and junior team members in methods to process tactical mitigations based on results of analysis and determination of threat validity
  • Conduct pivoting analysis on Threat Intelligence to identify current impact or proactively process mitigations for defense through security technologies and proactive mitigations including zero-day patching identification, anomalous behavior, and recommendations of remediation action
  • Drives support for the Threat Management Center during incident response and threat monitoring activities to include intelligence context and analysis support, provide industry expertise and recommend relevant remediation and countermeasures
  • Conduct trending and correlation of cyber intelligence for the purposes of attribution and establish strategic countermeasures to increase Verizon’s defenses, including customized signatures, in-house identified indicators of compromise and behaviors associated with targeted behavior, with support from the Threat Monitoring team
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of Central Florida
Bachelor’s Degree in Computer Science
Skills Skills
  • Strong working knowledge of basic office automation tool suites such as MS Office (Word, Excel, PowerPoint)
  • Strong collaborative skills and proven ability to work in a diverse global team of security professionals
  • Proven knowledge of computer hardware/software and strong understanding of computer/ internet communications methods
  • Knowledge in basic encryption
  • Security+, Certified Information Security Professional (CISSP), or GIAC Information Security Professional (GISP) Certification
  • Solid working knowledge in TCP/IP and networking fundamentals, architecture and security infrastructure best practices
  • Ability to work autonomously as well as contribute in a team and professional environment
  • Ability to develop and maintain professional contacts in the security community
  • Strong reporting and analytical skills with attention to detail
  • Solid working knowledge of Microsoft Windows Operating System, including registry, event logs and other common forensic artifacts
Create a Resume in Minutes

15 Cyber Intelligence Analyst resume templates

1

Cyber Intelligence Analyst Resume Examples & Samples

  • Primary GIA subject matter expert collocated with Cyber Security Fusion Center staff, Cyber Intelligence Center analysts, Cyber Incident Response Teams (CIRT) and other Citi units
  • Monitor cyber investigations, cyber incident reporting, open source message traffic, malware traffic, and cyber intelligence for threat intelligence equities
  • Develop strategic intelligence products/briefings based on internal investigative and incident data/reporting
  • Develop procedures and custom scripts for rapid and efficient analysis derived from large data/reporting sources
  • Manage relationships and collaborate with key cyber intelligence vendors to produce analysis on internal investigative/incident data and reporting
  • Produces analytical products and briefings/presentations for senior leadership and operational personnel on a variety of cyber threats and intelligence reporting
  • Builds partnerships with other Citi units responsible for cyber related operations, monitoring, crisis management and response
  • Apply theory and methods to collect, organize, analyze, interpret, and summarize reports and information to provide actionable intelligence and situational awareness to decision makers. Validate information/data, identify threat concerns and address them through all-source analytical solutions
  • Analyze threats that create a risk to the company, its employees, shareholders, assets and clients. Identify and report on operational events and trends, tactical assessments of current and future threats, operational, tactical and strategic recommendations to counter those threats
  • Display critical thinking in the creation of succinct narrative reports, presentations, visual mapping and link charts or similar diagrams to report analytical assessments. Display data and the results of analysis in clear straightforward presentations that can be understood by clients. Provide written explanations of analysis in plain language that supports the conclusions and observations
  • Manage requests and plan intelligence collection methods and determine the types and focus of those efforts. Evaluate multiple internal and external sources of information (including public records, media or other open source material) in order to determine any limitations in terms of reliability or usability. Drive Quality, Reliability, and Usability of all work products
  • Minimum of five (5) years of analytical experience in the cyber threat domain, intelligence analysis (private or government), statistical analysis, or relevant experience in large, complex environments. Previous experience with financial service companies is preferred
  • Minimum of two (2) years of experience working in a cyber related position or information technology role
  • Minimum of two (two) years of experience in computer programing, scripting, and or data parsing. Preferred languages include SQL, JavaScript, and/or Python
  • Preferred 2-3 years of experience in leveraging big data solutions including but not limited to Hadoop and/or Splunk in order to retrieve and analyze data to support analytical products
  • Demonstrated ability to analyze, evaluate and interpret complex information and reporting with a strong understanding and application of analytical techniques, including predictive modeling experience
  • Proven ability in translating business questions / problems into hypotheses to test and solve through the use of advanced analytical techniques
  • Proven track record of open and non-open source intelligence gathering, including strong use of commercial databases and Internet research
  • Demonstrated examples of innovation or continuous improvement in the intelligence or corporate security and investigative services areas
  • Minimum BA, graduate degree preferred, in computer science or computer security related areas
  • Demonstrated self-starter and resourceful individual, with experience of operating in fast paced and dynamic operational settings
  • Demonstrated examples of innovation or continuous improvement in risk, intelligence or corporate security and investigative services area
  • Broad professional experience, including prior international work experience/travel or experience working as part of a globally dispersed team an advantage
  • Brings a professional network of industry and government relationships
  • Excellent communication, negotiation and presentation skills. Ability to effectively communicate, both verbally and in writing, through all levels of the organization
  • Self-motivated and independent operator with the ability and maturity to make decisions in the absence of detailed instructions
2

Cyber Intelligence Analyst Resume Examples & Samples

  • IAT Level II Certification
  • 3-5 years of experience in a professional work environment
  • BS degree in CS or an IT-related field, including Information Assurance or Security
3

Cyber Intelligence Analyst Resume Examples & Samples

  • Collect, assess, and catalogue threat indicators
  • Add context to threat indicators to convey urgency, severity, and credibility
  • Cultivate and assess new sources of threat information and intelligence
  • Research threat actors
  • Investigate and respond to cyber security incidents
  • Participate in the incident response on-call rotation
  • Requires excellent writing and presentation skills to communicate findings
  • Knowledge of information security threat types, their composition, and IOCs
  • Knowledge of attacker tactics, techniques, and procedures (TTPs)
  • Log analysis and experience reviewing security events
  • Experience in the financial industry highly desired
  • Enterprise Security knowledge
  • Current security clearance is plus
  • Foreign language skills in Russian or Chinese
4

Cyber Intelligence Analyst Resume Examples & Samples

  • Conduct technical evaluations of new or emerging cyber threats, such as attack tools, exploits, malware, et al
  • Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, and effects on systems and information
  • Fuse computer network attack analyses with criminal and counterintelligence investigations and operations
  • Provide awareness to internal stakeholders on changes to the cyber threat landscape
  • Coordinate with and provide expert technical support to Computer Network Defense technicians to resolve Computer Network Defense incidents
  • Develop and manage technical capabilities needed to enhance intelligence collection, normalization, storage, and analysis in partnership with internal engineering teams
  • Write and publish Computer Network Defense guidance and reports on incident findings to appropriate constituencies
  • Collect information on threats to the organization through communication with other financial institutions, mailing lists, open source news, and industry partnerships
  • Correlate information with additional data sources to develop a comprehensive operational picture of malicious actors, and their tactics, techniques, and procedures
  • Publish internal threat intelligence reports and intelligence briefings to provide actionable information to tactical and strategic stakeholders
  • Conduct technical research to support AM’s Protect the Client program
  • Work with the AM Fraud teams to provide Cyber Indications and Warning (I&W)
  • Coordinate with and provide expert technical support to enterprise-wide Computer Network Defense technicians to resolve Computer Network Defense incidents
  • Establish relationships, if applicable, between the incident response team and other groups, both internal (e.g., legal department, Fraud) and external (e.g., law enforcement agencies, vendors, and public relations professionals)
  • Knowledge of common adversary tactics, techniques, and procedures (TTPs) in assigned area of responsibility (e.g., historical country-specific TTPs, emerging capabilities)
  • Knowledge of defense-in-depth principles and network security architecture
  • Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non-nation state sponsored], and third generation [nation state sponsored])
  • Knowledge of external organizations and academic institutions dealing with cybersecurity issues
  • Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise
  • Knowledge of social dynamics of computer attackers in a global context
  • Knowledge of the nexus between cyber counterintelligence and other intelligence operations (i.e., How/ Where/ When cyber counterintelligence fits in, etc.)
  • Knowledge of threat list countries
  • Skill in multi-disciplined intelligence report writing
  • Knowledge of computer networking fundamentals
  • Knowledge of content development
  • Knowledge of encryption methodologies
  • Knowledge of malware analysis concepts and methodology
  • Knowledge of network protocols (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP], Dynamic Host Configuration Protocol [DHCP]) and directory services (e.g., Domain Name System [DNS])
  • Knowledge of network traffic analysis methods
  • Knowledge of programming language structures and logic
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code)
  • Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files
  • Skill in performing packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump)
5

Cyber Intelligence Analyst Resume Examples & Samples

  • Depth of skills and experience - Information Security and Cyber Security
  • Professional with experience on security consulting, designing and delivering large projects/programs
  • ISO 27002, NIST 800 series, COBIT control framework
  • Experience with large projects/programs
  • Annual budget process
  • Design, deployment, optimization of Enterprise Security solutions and services e.g. Cyber Threat Intelligence, Security Analytics, SIEM, Malware detection & analytics, APT detection and containment etc
6

Cyber Intelligence Analyst Resume Examples & Samples

  • Publish internal threat intelligence products and intelligence briefings to provide actionable information to tactical and strategic stakeholders
  • Use threat intel to inform and develop threat detection strategies and to build out and update the alert catalogue
  • Establish relationships, if applicable, between the GTMR team and other groups, both internal (e.g., legal department, Fraud) and external (e.g., law enforcement agencies, vendors, and public relations professionals)
  • Strong collaborative skills and proven ability to work in a diverse global team of security professionals
  • Strong verbal and written skills
7

Cyber Intelligence Analyst Resume Examples & Samples

  • Develop and implement information security policies, standards and procedures to secure and protect data residing on systems
  • Work directly with user departments to implement procedures and systems for the protection, conservation and accountability of proprietary, personal or privileged electronic data
  • 3+ years in Security intelligence
  • Experience and understanding of standard Tactics, techniques and procedures utilized by cyber actors
  • Familiarity with various naming conventions pertaining to cyber actors
  • CISSP, CEH, or other Security certifications
  • 3+ years in Cyber Security intelligence
  • Previous Intel Agency experience, ex(NSA, DIA, Cybercon)
8

Cyber Intelligence Analyst Resume Examples & Samples

  • 3+ years of experience with conducting all-source intelligence
  • Experience with current and historical APT TTPs
  • Knowledge of Microsoft Excel and SQL database
9

Cyber Intelligence Analyst Resume Examples & Samples

  • 5+ years of experience with military intelligence collection and analysis
  • 3+ years of experience with briefing
  • 1+ years of experience with developing formal reports, informal reports, and briefings
  • 1+ years of experience with requirements and collections management processes and Web applications
  • Experience as a formally trained all-source intelligence analyst
  • Experience with Air Force Cyberspace operations, network analysis, or intelligence support to Cyberspace operations
  • Knowledge of JWICs, SIPR, and NIPR operation systems
  • Ability to work under pressure as part of a team and be detailed-oriented
  • DoDI 8570.1 Certification, including Network+ or Security+ Certification
10

Cyber Intelligence Analyst Resume Examples & Samples

  • Bachelor's degree with 14 years’ related experience, or Master’s degree with 12 years’ related experience or PhD and 9 years’ related experience or an additional 4 years of relevant / related work experience may be substituted for the Bachelor’s degree
  • Work experience to include Intelligence Analysis experience specifically within the DoD/IC
  • Experience with SIGINT experience within the DoD/IC
  • Experience with CNO and SIGINT tools and databases
  • Perform Internet Research writing and editing skills at a technical/professional level
  • Must have a TS/SCI with Polygraph Clearance
  • The ideal Multi-source candidate will be open to shift work
  • Fluent in a foreign language (such as Chinese, Korean, Arabic, Farsi, Russian, etc.)
  • DNI or DNR
11

Cyber Intelligence Analyst Resume Examples & Samples

  • Current/active TS/SCI w/ Polygraph clearance
  • High school diploma AND a MINIMUM of eight (8) recent application and experience as a Signals Analyst
  • Must have successfully completed some Signals Analytic Training Courses
  • Familiar with the following disciplines: Geospatial, Overhead, special collection, etc
  • Must be amenable to possibility of shiftwork
  • GMA/SGA experience
12

Cyber Intelligence Analyst Resume Examples & Samples

  • Bachelor’s Degree in an applicable field (Math, Computer Science, Electrical Engineering, etc.) field and 3 years of continuous professional experience in intelligence analysis or a related field
  • May substitute an additional 3 years of relevant Intelligence analysis work experience within the DoD/IC for the Bachelor’s degree
  • Must have demonstrated skills in analyzing intelligence information and technical data, analyzing exploitation opportunities, documenting information and processes, gathering intelligence information, interpreting analytical results, performing Internet research, writing and editing skills at a technical/professional level, and managing internal and external customer relations
13

Cyber Intelligence Analyst Resume Examples & Samples

  • Bachelor’s Degree and 9+ years of Intelligence Analysis experience; An additional 4 years of experience may be substituted in lieu of bachelors degree
  • 5+ years of Targeting experience
  • Familiarity with the subject matter of the customer and their procedures
  • Demonstrated experience working the operation life cycle and a strong understanding of the customer's classified
14

Cyber Intelligence Analyst Resume Examples & Samples

  • 8+ years of SIGINT report production experience and current experience with reporting tools and cyber technologies
  • Ability to collaborate with intelligence analysts and others on team to independently draft formal intelligence reports
  • Ability to regularly interact with senior personnel on team
  • Experience with the analysis and fusion of intelligence data
  • All candidates shall have excellent communications skills and experience working in team environments with end customers
  • Ability to provide technical subject matter expertise to a wide range of complex difficult problems
  • Experience representing the mission organization as the prime technical contact on significant targets or technologies
  • Familiarity with customer specific tools and other computer software is a must
  • Must currently maintain a TS/SCI clearance with polygraph
  • Experience with network analysis
  • A technical degree is highly desired
15

Cyber Intelligence Analyst Resume Examples & Samples

  • Bachelors Degree and 5+ years of experience an additional 4 years of related experience may be considered in lieu of a degree
  • Must have an active TS/SCI clearance with Polygraph to be considered
  • Prior experience with Computer Forensics and/or Targeting
  • Prior documented Targeting Experience
  • Knowledge of Social Media analysis desired
16

Cyber Intelligence Analyst Resume Examples & Samples

  • This position is contingent upon proposal/task award, funding, customer approval and clearance
  • Bachelor’s Degree and 5+ years of overall experience
  • Bachelor’s Degree and 9+ years of overall experience
  • 7+ years of SOO or Targeting experience within the IC
  • Experience with social media, social networking applications, and internet technologies
17

Cyber Intelligence Analyst Resume Examples & Samples

  • Bachelor’s Degree in Computer Science, Information Technology, Intelligence Studies, Language or other related field and 5+ of overall experience
  • Targeting experience with the IC
  • Social Media Expertise along and various language skills
18

Cyber Intelligence Analyst Resume Examples & Samples

  • Operational planning and analysis to identify targets
  • Analyze and determine operational and technical capabilities
  • Review, create, format, and edit cables and other classified written correspondence
  • Make skilled use of customer data mining tools
  • Identify intelligence in computer data; and compose actionable intelligence reports
  • Bachelors Degree and 5+ years of intelligence analysis experience, an additional 4 years of experience may be considered in lieu of degree
  • Active/Current TS/SCI with Polygraph clearance is required
  • Demonstrated experience in the Intelligence community composing intelligence reports
  • Understanding and familiarity with customer databases and classified data repositories
  • Bachelors Degree and 9+ years of intelligence analysis experience, an additional 4 years of experience may be considered in lieu of degree
  • 2+ years of Targeting experience
  • Highly preferred candidates will have ops training, foreign language skills, and familiarity with customer databases and
19

Cyber Intelligence Analyst Resume Examples & Samples

  • Bachelor’s Degree in Language Studies, Military Science or other related degree and 9+ years of overall work experience
  • Demonstrated experience as an Intelligence Analysis and/or Linguist
  • 5+ years of Targeting/Intelligence experience
20

Cyber Intelligence Analyst Resume Examples & Samples

  • This position is contingent upon proposal/task award, funding, customer approval and clearance crossover
  • Active/Current TS/SCI clearance with polygraph required
  • Bachelor’s degree and 2+ years of related experience
  • Familiarity with a variety of IC customer targeting tools and databases
  • Ability to produce a wide-variety of briefings and documentation for reporting purposes
  • Bachelor’s degree and 5+ years of related experience
  • BS in science or engineering discipline
  • Demonstrated experience as a targeting officer
  • Experience with Internet technologies and social network applications
  • Familiarity with Science and Technology issues addressed by the IC
  • Ability and willingness to travel overseas
21

Cyber Intelligence Analyst Resume Examples & Samples

  • Bachelor’s degree and 5+ years of experience. Additional 4 years of overall experience may be considered in lieu of degree
  • Demonstrated experience in research and analysis
  • Strong oral and written communication skills, including the ability to produce a wide-variety of briefings and documentation for reporting purposes
  • Bachelor’s degree and 9+ years of experience. Additional 4 years of overall experience may be considered in lieu of degree
  • 2+ years’ experience as a targeting officer
22

Cyber Intelligence Analyst Resume Examples & Samples

  • Bachelor’s Degree and 5+ years of experience; An additional 4 years of experience may be substituted in lieu of bachelor’s degree
  • A demonstrated record of establishing and maintaining effective relationships with customer staff; - Strong working knowledge of basic office automation tool suites such as MS Office (Word, Excel, PowerPoint)
  • Bachelor’s Degree and 9+ years of experience; An additional 4 years of experience may be substituted in lieu of bachelor’s degree
  • Familiarity with the subject matter of the customer and thier procedures
23

Cyber Intelligence Analyst Resume Examples & Samples

  • 5 years of SIGINT DNI or GNA experience
  • Experience includes aspects of technical analysis in the DNI/Telephony/GNA disciplines and drafting reports for editing and quality control by Senior Intelligence Analysts
  • Experience with analytic tools to include an understanding of the SIGINT collection/collection management architecture
  • Ability to independently determine and develop approach to solutions
  • Currently maintain a TS/SCI clearance with polygraph
  • 5 years of related experience with a Bachelor’s Degree, 3 years of related experience with a Master's Degree, 9 years related experience without a Bachelor’s Degree
  • Experience with SIGINT end-product reports
24

Cyber Intelligence Analyst Resume Examples & Samples

  • Translate, transcribe, and gist audio and graphic material from the source language into idiomatic, standard American English
  • Scan and categorize foreign language materials
  • Recover and identify essential elements of information
  • 2 Years related experience with Bachelors in Science; 0 Years related experience with Masters Degree
  • Two (2) years full-time experience in Cryptologic Operations performing language processing in the required language(s)
  • Performance at Interagency Language Roundtable (ILR) skill level 2 in both audio translation and [text] translation from the required language(s) into idiomatic, standard American English
  • Demonstrates the skill and ability to perform professional tasks
  • Develops recommended solutions to technical problems as assigned
  • Ability to work independently under only general supervision by immediate supervisor, project leaders, and other professionals in the section or group
  • One (1) year experience typing on an English keyboard
  • Required language(s) include at least one of the following: Albanian, Arabic, Azeri, Chinese, Farsi, Hebrew, Korean, Pashto, Portuguese, Russian, Serb-Croation, Somali, Spanish, Urdu
  • Current TS/SCI w/Poly is required
25

Cyber Intelligence Analyst Resume Examples & Samples

  • Bachelor's degree and 2 years of experience (OR) Associate's degree and 4 years of experience (OR) High School diploma/GED and 6 years of experience
  • Experience as a telecommunication/network/geo metadata analyst
  • SIGINT experience
  • Experience with CPE, Analyst Notebook and other IC tools and resources
  • Prior leadership experience
26

Cyber Intelligence Analyst Resume Examples & Samples

  • Bachelor's degree with 2 + years of related experience
  • An additional 2 years of relevant / related work experience may be substituted for the Bachelor’s degree
  • Experience with Multi-Intelligence (which includes a solid understanding of the SIGINT, HUMINT, IMINT, Open-Source, and Geospatial intelligence) experience within the DoD/IC
  • Experience with CNO and SIGNIT tools and databases
27

Cyber Intelligence Analyst Resume Examples & Samples

  • 5 years of intelligence analysis experience
  • Experience includes aspects of technical analysis in the various media disciplines and drafting reports for editing and quality control by Senior Intelligence Analysts
  • Experience with analytic tools to include an understanding of collection/collection management architecture
  • All candidates shall have excellent communications skills and experience working in team environments with end
  • Experience with end-product reports
28

Cyber Intelligence Analyst Resume Examples & Samples

  • Must possess and maintain a TS/SCI security clearance
  • Must be able to obtain and maintain a polygraph; active TS/SCI with CI Polygraph preferred
  • Bachelor’s degree in Computer Science, Information Assurance, Computer Security, or equivalent (Master Degree in a related field is desired)
  • 5+ years experience in All-source analysis and production
  • 5+ years experience supporting the Intelligence Community (IC)
  • 3+ years experience with Intelligence Fusion
  • Proficient in information security incident handling
  • Experience with Cyber Intelligence Analysis and Cyber Fusion
  • Communicate succinctly and directly in oral and written presentations and documents, adhering to length, quality, audience and timeliness constraints
  • Experience with RSA Archer vendor products extremely valuable to customer
  • Must presently be 8570 compliant (IAT Level 2 preferred); must be 8570 compliant (IAT Level 2) by date of security indoctrination with any necessary continuing education (CE) for certification
29

Cyber Intelligence Analyst Resume Examples & Samples

  • Minimum of 4 years of experience with Perl, Python, or other scripting language in an incident handling environment
  • Minimum of 4 years of experience conducting analysis of log data and network devices in support of intrusion analysis or
  • Previous experience performing Red/Blue Team activities
  • Experience working with large data sets and high-performance computing systems
  • Experience with cyber threat intelligence methodologies
  • Linux/Unix and Windows proficiency, including shell (Bash, PowerShell) scripting
  • Familiarity with current information security threats facing US defense contractors or the U.S. Government
  • Other vendor certifications considered (e.g. EnCE, ACE, CCNA, CISSP, etc.)
30

Cyber Intelligence Analyst Resume Examples & Samples

  • Respond to computer security incidents in compliance with Information Security Policies and Industry Best Practices - Coordinate the efforts of and provide timely updates to multiple sectors and business units during incident response
  • Provide security related recommendations to the team as threat events unfold - Perform basic network forensic analysis in support of Intrusion detection operations including the development of indicators used to enhance the network security posture
  • Contribute to a team of information security professionals working with threat data, writing reports, briefing event details to leadership, and coordinating remediation across multiple Northrop Grumman organizations
  • Ensures technical security improvements are effective and maintained within configuration management structures
  • Ensures technology employed by the Security Monitoring Team compliments operational processes
  • On occasion, provide extended shift coverage with minimal travel required - The incumbent will regularly monitor various information security related web sites (SANS Internet Storm Center, etc.) and mailing lists (BugTraq, etc.) to stay up to date on current network threats, attack methodologies and trends
  • Analyze the potential impact of new threats and exploits and communicate risks to relevant business units
  • Monitor the Northrop Grumman Global Network to find anomalous or malicious activity using various analytical methods and Security Event incident Monitoring (SEIM) tools in a high paced operational environment
  • U.S Citizenship is required
  • Ability to obtain and maintain a clearance
  • Bachelor's degree in related field plus 2 years related work experience; 0 years with Master's degree or 6 years related
  • Must be able to work a 3rd shift 11:00 pm - 7:00 am or multiple shifts as required by the program
  • Requires knowledge of, and skill in applying, advanced CNO analysis concepts, principles, practices, laws, regulations, methods and techniques
  • Advanced knowledge of and skills to use advanced analytic techniques, scripts, intrusion set data, and forensic data for the analysis of CNO threats
  • Able to defend, explain, and brief technical analytic problems and solutions to senior decision makers in a time sensitive environment
  • Ability to work in a team environment ability to taking initiative to understand and master new operating systems, security applications and open source tools
  • Knowledge with Windows and Linux operating systems and common applications, working knowledge of and experience in detecting malicious code
  • Knowledge of information systems security concepts and technologies; network architecture and tools; general database concepts; document management; hardware and software troubleshooting; intrusion tools; and open source alternatives
  • Network + , Security + ,GIAC Security Essentials Certification (GSEC),GIAC
31

Principal Cyber Intelligence Analyst Resume Examples & Samples

  • Ability to communicate clearly and concisely in writing
  • Ability to communicate objective analysis and logical argumentation in writing
  • Experience using technical information to bolster intelligence analysis
  • Experience using open source and paid services for cyber threat intelligence information
  • Ability to write scripts/programs to facilitate analysis
  • Ability to identify and articulate analytic gaps in writing
32

Senior Cyber Intelligence Analyst Resume Examples & Samples

  • Minimum of three years producing intelligence analysis, to include strategic analysis of cyber threats
  • Knowledge of standards of intelligence analysis tradecraft
  • Expertise in one or more cyber threat areas
  • Knowledge of how multiple types of malware operate and are employed against victims
  • Experience using tools to extract indicators from malware
  • Experience using analytic visualization and big data consumption tools
  • Nice to have: Ability to read Mandarin and/or Russian
33

Cyber Intelligence Analyst Resume Examples & Samples

  • Support the CFPB CSIRT in identifying an evolving threat profile for the Bureau by integrated review of open source, cyber threat intelligence from various intelligence sources such as DHS/US-CERT, other government agencies, and various open source providers
  • The Contractor shall participate in recurring meetings sponsored by the Department of Homeland Security (DHS) and other Government organizations as needed to facilitate an operational understanding of threat actor trends that may be of significance to the CFPB
  • Responsible for the identification of potentially compromised hosts, IPs and domains; malicious code threats; and new attack methods. The Contractor shall identify new methods of threat detection and provide recommendations for potential new threat detection techniques and/or technology deployments
  • Produce an Open Source Intelligence Report for general dissemination to IT personnel and potentially the entire CFPB workforce
34

Multi Source Cyber Intelligence Analyst Resume Examples & Samples

  • Assist in the coordination and direction of all activities outlined in the proposal
  • Collaborate effectively and efficiently within a small, hybrid team
  • Mentor and lead analytical activities to insure that that the team’s efforts result in actionable cyber intelligence that positively impacts the risk mitigation and cyber security posture of the client
  • Provide intelligence related technological and process-centric mentorship to a multi-functional, hybrid team of highly skilled professionals
  • Analyze multi-source data feeds from a technical/cybersecurity perspective in response to production requirements for critical and high threat subjects
  • Interface directly with the client, SOC, and other stakeholders in the client’s Operational Environment, as needed
  • Organize and contribute to the writing and briefing a range of cyber intelligence related products and support the production of multi-source cyber intelligence products
  • Conduct technical/cybersecurity focused analysis by initiative or in response to identify threats to the client’s operational environment and its enterprise activities
  • Must be an effective communicator, both orally and in writing
  • Assist in the formulation and enforcement of standards, the assigning of schedules, supervising team members, communicating policies and intent, and insuring that tasks are implemented in a timely manner
  • B.S. degree in Computer Science, or equivalent Cyber Security certifications, to include CISSP, CISM, CEH, and ECSA, or similar technical degree or equivalent experience in cyber intelligence/cyber security
  • 7-10 years of relevant experience required in cyber security environment
  • Experience with conducting Open Source Intelligence collection and analysis
  • Formal analytical training preferred
  • Experience working in a small, dynamic, interdisciplinary teams
  • Experience working in a multi-source or all-source environment
  • Knowledge of MS Excel, Access, Project, and PowerPoint required
  • Experience working within an interagency environment a must
  • Attention to detail is a must; a quick learner, good problem solver, decision maker, facilitator, and communicator. Self-directed, with the ability to work independently in a fast-paced environment, and aggressively drive project milestones to successful completion
  • Ability to adapt and respond efficiently and effectively to change, delay, and/or shifting priorities and goals
  • Experience with integrating various streams of data in order to analyze current and emerging intelligence issues related to cyber threats
  • TS/SCI clearance is required
  • Experience with database management a plus
  • Statistical analytical experience a plus
  • Knowledge of systems thinking/theory preferred
35

Cyber Intelligence Analyst Resume Examples & Samples

  • Bachelor’s Degree and a minimum of 9 years Intelligence Analysis experience is required. An additional 4 years of experience may be substituted in lieu of degree
  • Current TS/SCI clearance with Polygraph required
  • Experience working the customer desk function
  • Demonstrated record of establishing and maintaining effective relationships with customer staff
  • Experience drafting customer tasking requirements using official customer traffic mechanisms
  • Ability to brief customer review panels
  • Experience working the full life-cycle of customer operations
  • 5 or more years of SOO or Targeting experience within the IC
  • Demonstrated experience working the operation life cycle and a strong understanding of the customer's classified Programs
36

Junior Multi Source Cyber Intelligence Analyst Resume Examples & Samples

  • Bachelor’s degree or equivalent education and work experience
  • Minimum two (2) years of intelligence analysis experience
  • Knowledge of the cyber threat landscape – including actors, TTPs, targets, etc
  • Ability to interpret indicators of compromise to create actionable cyber threat intelligence utilizing internal, client and open source technical sources, including malware reports, logs or forensic reporting
  • Experience performing technical research on the internet underground (deep/dark web)
  • Advanced NETFLOW or PCAP Analysis
  • Experience writing YARA rules or IOC’s preferred
  • Ability to write SQL queries preferred
  • In-depth knowledge of cultural, social and political activities and conditions in foreign countries
37

Cyber Intelligence Analyst Resume Examples & Samples

  • Contributes to the development of intelligence products and performs a vast array of cyberspace intelligence analyst duties with no guidance
  • Possesses an in-depth understanding of intelligence analytic concepts to monitor, assess, and report on cyberspace operations, capabilities, and vulnerabilities
  • Contributes substantive content for reports and briefings
  • With no guidance, advises stakeholders and coordinates actions
  • Contributes substantive content to the development of complex analytic approaches and recommendations to problems and situations for which data are incomplete, controversial, or which no precedence exists
  • Minimum 3 - 6 years of experience as an Intelligence Analyst, Cyber or Signals Intelligence (SIGINT) focus
  • 3-6 years’ experience supporting USCYBERCOM
38

Cyber Intelligence Analyst Resume Examples & Samples

  • Develops reports and briefings
  • Enhances stakeholder relationships; advises and coordinates actions
  • Develops analytic approaches and recommendations to problems and situations for which data are incomplete, controversial, or which no precedence exists
  • Minimum 5 - 10 years of experience as an Intelligence Analyst, Cyber or Signals Intelligence (SIGINT) focus
  • This requisition may be filled at either a level 3 or a level 4
39

Cyber Intelligence Analyst Resume Examples & Samples

  • Possesses a general understanding of intelligence analytic basic concepts to monitor, assess, and report on cyberspace operations, capabilities, and vulnerabilities
  • With minimal guidance, advises stakeholders and coordinates actions
  • Contributes to the development of analytic approaches and recommendations to problems and situations for which data are incomplete, controversial, or which no precedence exists
  • Minimum three years of experience as an Intelligence Analyst, Cyber or Signals Intelligence (SIGINT) focus
  • 1-5 years’ experience supporting USCYBERCOM
40

Cyber Intelligence Analyst Resume Examples & Samples

  • A Bachelors Degree and a minimum of 5 years related technical experience; or an additional 4 years of work experience can be substituted in lieu of the degree
  • Minimum of 5 years experience with tools and techniques that monitor and defend all networks, enclaves and systems on a 24/7 basis
  • Ability to gain and maintain a Public Trust clearance
  • Must be a self-starter and work well in a team environment
  • Must not have traveled outside the US for a combined total of 6 months or more in the last 5 years
  • Must have resided in the US for the last 5 years
  • Position is based in Raleigh, NC and does not provide relocation assistance
  • Existing Public Trust clearance
  • CEH, MSCE, CGIA, CCNA, or CISSP Certification
  • Statistical modeling and analysis experience to infer possible cybersecurity threats
  • Experience in analysis in investigations, such as with IT, law enforcement, military intelligence, or business analytics
  • Pentesting experience
  • Experience with Splunk
41

Cyber Intelligence Analyst Resume Examples & Samples

  • A Bachelors Degree and a minimum of 9 years of related technical experience; or an additional 4 years of experience may be substituted in lieu of a degree
  • Minimum of 9 years experience working with tools and techniques that monitor and defend networks, enclaves and systems (on a 24/7 basis)
  • US Citizen or Permanent Resident is required
  • Must have resided in the United States for the last 5 years
  • Position is located in Raleigh, NC and does not provide relocation assistance
  • Active Top Secret or Secret security clearance with the ability to obtain a TS/SCI
42

Cyber Intelligence Analyst Resume Examples & Samples

  • BA/BS Degree OR 5+ years of intelligence-related experience
  • Experience in Cyber Intelligence concepts and implementations
  • Experience in Cyber intrusion kill chain concepts and implementation
  • Top Secret clearance with ability to upgrade to SCI
  • Prior experience at ICE
  • Security certification such as CISSP, CISM, CEH, etc
43

Cyber Intelligence Analyst Resume Examples & Samples

  • Enterprise Incident Response
  • Intelligence Analysis (both internally produced & externally sourced)
  • Capability development
  • Development and tracking of Adversary Campaigns
  • Industry Collaboration
  • Strategic Enterprise Mitigations
  • Technical mentoring
  • 2-5 years of technical work experience supporting an enterprise scale Computer Network Defense (CND)/ Intelligence capacity
  • Ability to communicate/interact with various audiences, including executives
  • Experience with tracking Advanced Persistent Threat (APT) campaigns
  • Familiarity with CND based analytical frameworks (Kill Chain, Pyramid of Pain, Racetrack, etc)
  • Must have experience interacting with industry sharing organizations
  • Must be familiar with external intelligence enrichment sources (VirusTotal, PassiveTotal, etc)
  • Must have an in familiarity of Windows & Unix systems
  • Must have experience with Linux CLI tools (awk, sed jq, etc)
  • Must have experience with common network defense languages (yara, snort, etc)
  • Familiarity with at least one scripting language (python, perl, powershell, etc)
  • Evidence Acquisition & Analysis – volatile and static
  • Experience with both Commercial and Open Source security tools
44

Cyber Intelligence Analyst Resume Examples & Samples

  • Monitor, identify, respond, investigate and document the resolution of computer and network security compromises
  • Provide remediation support to compromised computers or IT systems
  • Global coordination of security incidents to Business Unit stakeholders
  • Carry out analysis to determine root cause of security incidents
  • Maintaining and increase proficiency with CIRT tools and analysis processes; including documentation of analysis, researching techniques, countermeasures and trends in computer and network vulnerabilities
  • Contribute to alert signatures tuning; Splunk alerts, SourceFire/Snort Signatures, Yara Signatures
  • Maintain an understanding of current and emerging information security threats and vulnerabilities
  • Contribute to the documentation and developement of CIRT processes
  • Complete and thorough documentation in support of metrics and trends
  • OSI layer
  • Windows Systems Structure
  • Unix Systems Structure
  • Security Tools experience (Firewalls, Intrusion Detection/Prevention Systems, AntiVirus, URL filter, etc.)
  • Solid working knowledge of Microsoft Windows Operating System, including registry, event logs and other common forensic artifacts
  • Solid working knowledge in TCP/IP and networking fundamentals, architecture and security infrastructure best practices
  • Ability to document technical analysis and generate reports
  • Data analysis and correlation
  • Packet Capture Analysis
  • Experience in performing static and dynamic analysis of suspect malware
  • Knowledge in basic encryption
45

Senior Cyber Intelligence Analyst Resume Examples & Samples

  • Consolidate and analyze financial data (budgets, income statement forecasts etc) taking into account organizations goals and financial standing
  • Provide creative alternatives and recommendations to reduce threats to the finance network
  • Assemble and summarize data to structure sophisticated reports on financial status and risks
  • Develop financial models, conduct bench-marking and process analysis
  • Conduct business studies on past, future and comparative performance and develop forecast models
  • Identify trends, advise customer and recommend actions based on sound analysis
  • Track and determine financial status by analyzing actual results in comparison with forecasts
  • Reconcile transactions by comparing and correcting data
  • Gain and update job knowledge to remain informed about novelty in the field
  • Consult with team to guide and influence long term and strategic decision making within the broadest scope of the study
46

Cyber Intelligence Analyst Resume Examples & Samples

  • Review and analyze current network configurations in response to changes in the threat environment in order to determine potential vulnerabilities and recommend mitigating actions
  • Develop and implement enterprise-wide mitigating actions in response to complex vulnerabilities that cannot be resolved through software or configuration modifications alone
  • Develop strategies to leverage existing infrastructure to enhance the defense-in-depth of the Marine Corps networks
  • Conduct in-depth trend analysis using all available defensive cyber operations tools in order to identify potential threats not clearly visible in a single report
  • Bachelor’s Degree in Cyber Security or related field and 5 years experience, or 9 years of experience could be substituted for degree
  • DoD 8570 IAT Level II and CNDSP Auditor certification required within 180 days of hire
  • Ability to obtain and maintain a Secret security clearance to start with ability to upgrade to Top Secret after start date
  • 8 years of practical experience in cyber intelligence and/or cyber security
  • Current Security+ Certification
  • Current Certified Ethical Hacker (C|EH) Certification
  • Familiarity with CND policies and procedures specific to the DoD
  • Experience with cyber defense boundary tools, to include Access Control Lists (ACL), Firewalls, IDS/IPS, Anti-Virus, and Web Content Filtering
47

Cyber Intelligence Analyst Resume Examples & Samples

  • May be required
  • Obtain and maintain a top secret clearance. Completion of a single scope background investigation is required before appointment. For more information visit OPM Mythbuster Page
  • Submit to a drug test prior to your appointment and random drug testing while you occupy the position
  • If selected you must maintain a TS/SCI clearance and you may be required to submit to a polygraph examination
  • Some work may require walking and standing in conjunction with travel to attend meetings and conferences away from the work site
48

Cyber Intelligence Analyst Resume Examples & Samples

  • Bachelor’s Degree and nine (9) years of professional experience. An additional four (4) years of related intelligence experience may be considered in lieu of degree
  • Experience with Network Analysis and Packet Capture tools, such as: WIRESHARK, NETWITNESS, Splunk, tcdump, netcap, etc
  • Experience in developing: tools and APIs, with the ability to perform quick enhancements and one-off modifications
  • Strong knowledge of computer hardware/software and strong understanding of computer/internet communications methods
  • Cyber Network Targeting experience within the Intelligence Community
  • Software tool development experience
  • Mastery with Network Analysis, Data Filtering with Packet Capture tools, such as: WIRESHARK, NETWITNESS, Splunk, tcdump, netcap, etc
49

Cyber Intelligence Analyst Resume Examples & Samples

  • The Cyber intelligence analyst responsible for the research and collection of threat in-formation from multiple sources, based on agreed cyber intelligence requirements, and for processing this into timely, clear, accurate and actionable security intelligence, threat assessments, management briefings, security alerts, source reports, multi-media presentations, workshops, training and other relevant security and awareness
  • Interprete the risk of global syngenta compromises by fully articulating the threat actors for Syngenta, their methods and exploits used
  • Prevent compromises by proactively providing input into new detection and remediation strategies
  • Maintain the cyber intelligence operating model and ensure it meets emerging cyber threats affecting Syngenta’s assets, people, product and information
  • Develop specific capability in Product Security cyber intelligence in support of anti-counterfeiting investigation and enforcement
  • Build a detailed intelligence picture regarding cyber threats to Syngenta
  • Maintain real-time monitoring of cyber threat intelligence (third party security feeds, forums, and mailing lists) to gather information on vulnerabilities and exploits related to Syngenta
  • Produce and implement the Intelligence operating procedures and working practices documentation
  • Design and implement threat actor mapping to help identify exploits and motivations used in cyber campaigns against Syngenta, competitors and the agrochemical business
  • Timely production of intelligence outputs to inform and lead senior security leaders to understand the most significant cyber risks
  • Produce actionable intelligence that can be digested by IT security systems to quickly detect and prevent cyber attacks
  • Inform the global security group by participating in regular threat focus meetings
  • Operationally support all in-house collection and storage mechanisms for cyber intelligence and develop correlations between external and internal data
  • Understand the basics of malware infrastructure and cyber exploits to help understand immediate threats to Syngenta
  • Collaborate with Product Security specialists in counterfeiting risk assessment, targeting of threat actors in cyber space and drive lead development throughout all stages of an investigation against cyber targets
  • Collaborate with specialist vendors supporting Product Security cyber threat intelligence
50

Cyber Intelligence Analyst Resume Examples & Samples

  • The Contractor shall
  • Advise of the day-to-day activities of the Forensics Laboratory; Develop and maintain the biweekly forensic activities report that identifies Forensic Team accomplishments and goals. Participate in IT security meetings and briefings; attend Enterprise Architecture meetings and briefings as required
  • Track evidence inventory for intake and release of all evidence items delivered to the forensics laboratory. This includes insuring proper handling and maintenance of evidence and chain of custody records
  • Case intake and logging to include entries/updates to the Case Management System and coordination of case load
  • Ensure completed requests for service for all requests are received by the forensic laboratory. This includes verification of all related deliverables
  • Read and analyze packet traces and raw log dumps
  • Provide support, reports and all related deliverables on „chain of custody‟ matters
  • Create Digital forensics reports
  • Process a case from intake, processing, and reporting within 2 weeks
  • Maintain requests for service for all requests received by the forensic laboratory
  • Perform advanced forensics collection techniques using EnCase® software, read and analyze packet traces and raw log dumps
  • Provide support, reports, and all related deliverables on „chain of custody‟ matters
  • Attend weekly DHS Focused Operations meetings
  • Participate in weekly TSA Network Intrusion Working Group meetings
  • Perform advanced reverse engineering techniques using debugging software, and behavioral analysis techniques
  • 6 years of strong security experience is required
  • Contractor must be proficient in developing and presenting, both verbally and in writing, highly technical information and presentations to non-technical audiences at all levels of the organization. Audiences for this information include, but are not limited to, senior executives at TSA and other agencies
  • Proficiency with utilizing and evaluating results from the following set of tools to include but not limited to: Encase, FTK, Sawmill, Norman sandbox, Ida pro, and HB Gary
  • Experience with case management software
  • Proficiency with Operating Platforms to include but not limited to: Windows, Apple, and LINUX
  • Previous experience with handling and processing of digital evidence to include imaging, chain of custody, and analysis
  • Hands on experience with processing large data sets and RAID configurations
  • Familiarity with networking technologies and packet structure
  • Experience as a court recognized expert witness in the area of digital evidence collection
  • Prior experience writing objective, accurate, and concise reports effectively communicating all findings to stakeholders
  • Industry standard Forensic Certifications such as EnCE or SANS GIAC preferred
  • Experience collecting intelligence and analyzing and creating relevant reports
  • Experience taking disparate, seemingly-unrelated intelligence and extract meaning or relevance from the data
  • Ability to act as a briefer to effectively communicate intelligence data in a concise, effective, and persuasive manner
  • Travel: 5%
51

Principal Cyber Intelligence Analyst Resume Examples & Samples

  • Bachelor's Degree in Computer Engineering or in a STEM major (Science, Technology, Engineering, or Math) and/or equivalent experience
  • Proven operational IT experience
  • Proven experience with Network Security Monitoring, SIEM and/or other log aggregation and correlation tools
  • Proven experience with host-centric detection & response skills, as well as process automation
  • Excellent communication skills with the ability to drive technical change and constructively influence peers and leadership
  • Previous hands on experience in the information and cyber security field
  • Specific focus on Digital Forensics & Investigative Response (DFIR), cyber security, threat detection, penetration testing (red/blue) and vulnerability management
  • Demonstration of leadership abilities as well as a strong comprehension of emerging threats
  • Deep capabilities in offensive / defensive technologies and agile risk assessment will be critical to success
  • Experience in Network Security Monitoring practices, with direct hands-on experience with one or more NSM related technologies: Bro, Snort, Security Onion, Sguil, Snorby, or similar
  • Experience with host based detection and IR technologies such as McAfee EPO, OSSEC, Yara, MIR, CarbonBlack, Tanium, HBgary ActiveDefense or similar
  • Experience with Python and object oriented software development practices in Python
  • Detailed understanding of APT, Cyber Crime and other associated cyber threat tactics
  • Experience leading small to medium-sized teams in focused, matrixed projects
  • CISSP, OSCP or related SANS certifications preferred
  • Experience with host-centric tools or other forensic software and techniques
  • Experience with malware and reverse engineering Experience with host-centric detection and response skills
  • Experience with Software Defined Networking (SDN) principles using Contrail
  • Working knowledge of secure communication methods, including Secure Shell, SILC, and PGP/GPG
  • Platforms using hardware security modules (local HSMs), SafeNet, Thales
  • Distributed computing, clusters, virtualization, high availability, load balancing
  • Demonstrated experience with web technologies a definite plus
  • Experience working with organizations with SaaS business models is a plus
  • Experience with Agile Management
52

Cyber Intelligence Analyst Resume Examples & Samples

  • Conduct proactive Computer Network Defense (CND) intelligence operations to counter specific methodologies, tools, tactics and intentions of advanced cyber adversaries
  • Participate in analysis of security network incidents, cyber intelligence material, vulnerability reports, malware reports, and other security relevant sources for purposes of defining and providing early warning of cyber threats
  • Develop processes for cyber threat assessments to support cyber risk assessments
  • Collaborate with intelligence analysts at external organizations to evaluate and develop clear threat picture for customer’s enterprise networking environment
  • Provide all-source/open source analysis on tactics, techniques and procedures utilized by DOD adversarial elements and external collaborating agencies
  • Must have a TS/SCI clearance with CI Poly
  • Minimum Bachelor’s degree and 2 years’ experience, Associates degree with 4 years’ experience or 6 years equivalent experience without a degree
  • Experience conducting threat analysis
53

Cyber Intelligence Analyst Resume Examples & Samples

  • 6 years of experience with conducting Cyber analysis
  • 1 year of experience with conducting log analysis
  • TS/SCI clearance w/ CI Polygraph
  • Security+, Certified Information Security Professional (CISSP), or GIAC Information Security Professional (GISP) Certification
  • Experience with counterintelligence or investigative expertise
  • Experience with IDS alerts
  • Experience with IC resources and reporting databases, including M3 or TAC
  • Experience with using i2 Analyst Notebook
  • Experience with using Splunk
  • Experience with Linux command line
  • Possession of excellent time management skills
  • Network+ or Wireshark Certified Network Analyst (WCNA) Certification
54

Cyber Intelligence Analyst Resume Examples & Samples

  • Demonstrated broad background in information security tools, concepts and issues across a broad range of technologies including Network and Software Security by related work experience
  • Secure Software Design and Architecture
  • Knowledge of static code analysis tools
  • Experience with all versions of Microsoft windows and Linux operating systems
  • CEH, GCIA, or GCIH certification
  • Expertise in Software and Application Security Development Concepts with the ability to conduct code reviews is a plus
  • Experience with HBSS, ACAS and IDS tools
  • Familiarity with software cryptography, RNG, and hashing
55

Cyber Intelligence Analyst Resume Examples & Samples

  • Four (4) continuous years of work experience in Intelligence Analysis or a related field OR a Bachelors Degree in a hard science and two (2) continuous years of Intelligence Analysis experience
  • Work experience must include two (2) years of Intelligence analysis experience within the DoD/IC
  • Demonstrable critical thinking, advanced research, and problem-solving experiences. CLEARANCE REQUIREMENTS: Must have current TS/SCI with a Full Lifestyle Polygraph
  • Self-motivated and creative
  • Willing to work as a member of a team
  • Organized and able to manage individual schedule
  • Foreign language skills desired
  • Experience with directly conducting real world computer network operations
  • Experience with the languages of the Middle East, Asia, South Asia, Eastern Europe, or South America; Knowledge of the US intelligence community and DoD
  • Ability to translate technical information for a non-technical, decision-making audience
56

Cyber Intelligence Analyst Resume Examples & Samples

  • Eight (8) continuous years of work experience in Intelligence Analysis or a related field OR a Bachelors Degree in a hard science and five (5) continuous years of Intelligence Analysis experience
  • Work experience must include five (5) years of Intelligence analysis experience within the DoD/IC
  • Demonstrable critical thinking, advanced research, and problem-solving experiences
57

Cyber Intelligence Analyst Resume Examples & Samples

  • Responsible for creating and executing incident response plans, processes, and procedures and performing root cause evaluations
  • Needs to be able to define events vs. alerts vs. incidents for the organization, and create incident classification, severity, and priority tables in line with all threats, risks and vulnerabilities
  • Must be able to identify and document incident trends and compromise patterns
  • He or she should be able to mentor and coordinate tasking for team members
58

Cyber Intelligence Analyst Resume Examples & Samples

  • Minimum 5 years of Incident Response experience, with an emphasis on intrusion techniques, intrusion detection system and rule creation and alert analysis
  • Computer forensics experience using Guidance Software EnCase, AccessData FTK, Helix and other forensic tools is preferred
  • Expert understanding of log, network and system forensic investigation techniques
  • Expert understanding of intrusion detection systems (e.g., Snort,Suricata) and tools (e.g., tcpdump, Wireshark)
  • Expert understanding of network protocols and TCP/IP fundamentals
  • Proficiency in malware triage and reverse engineering
  • Proven understanding and in-depth knowledge of operating systems (Windows, Linux or OS X)
  • Knowledge of enterprise systems and infrastructure, network based services and client/server applications
  • Familiarity with network architecture and security infrastructure placement
  • Familiarity with security tools such as antivirus, full packet capture and data loss prevention tools
  • THIS POSITION REQUIRES SPORADIC CONUS AND OCONUS TRAVEL AS DICTATED BY INVESTIGATIVE AND OPERATIONAL NECESSITY. Estimated travel time is six days per month
59

Cyber Intelligence Analyst Resume Examples & Samples

  • Identification of emerging threats
  • Threat Actors: Tracking non nation-state activities, organized cyber criminals and hacktivists
  • High level tracking of nation state threat actors, changes in nation state doctrine, policy or legislation that may impact Philips
  • Monitoring of information sources to gather information on threats and vulnerabilities relevant to Philips
  • Ability to initiate, develop and maintain professional contacts in the cyber security community & relevant government agencies
  • Assessing external events based on factual information and wider contextual information available
  • Trustworthiness and integrity
  • A pro-active attitude towards information sharing and collaboration
  • Bachelor degree in Political Science / International Affairs / Computer Science / Economics or equivalent combination of education and (work) experience
  • Strong networking skills
  • Excellent written and verbal communication skills including the ability to effectively communicate information security risk related concepts to technical and non- technical audiences
  • Certifications such as CISSP, CISM, GSEC are a plus
60

Cyber Intelligence Analyst Senior Cnd-shift nd Resume Examples & Samples

  • 5+ years of IT security experience
  • Must hold a current DoD 8570 "CND Analyst" certification or greater (one of the following; CEH, GCIA, GCIH)
  • Must hold a IAT level II certification or greater (one of the following; GSEC, Security + CE, CCNA security, SSCP)
  • ArcSight, SourceFire, and Solera are systems and appliances that the engineers are responsible for the updating both the operating systems, version releases, and signatures (SEU’s)
61

Cyber Intelligence Analyst Resume Examples & Samples

  • Ability to operate automated data processing tools for both remote and location collection, processing and reporting
  • Identify, Define, and Nominate Intelligence requirements in furtherance of business requirements defined by management, and operational teams
  • Assess technical capabilities and motivations of adversaries through both direct observation and secondary reporting
  • Ability to analyze technical indicators in relation to events and incidents in order to determine trends, patterns, and true Indicators of Compromise
  • Establish and maintain systematic, cross-referenced intelligence records and files
  • Perform statistical, spatial, and/or qualitative analyses as needed, making use of varied software packages
  • Prepare and present reports and briefings on analytical findings and other analysis topics
  • Perform analysis of complex datasets spanning multiple network based sensors to produce relevant intelligence products
  • Support internal investigations and identify intelligence sources, gaps and strategies
  • Leverages ability to identify new attack TTPs and mitigation techniques in support of long term operations and strategic program support and development
  • Will use disparate data sources and evidence to detect and decipher patterns in adversary activities, with a primary focus on the cyber threat landscape, in furtherance of relevant intelligence products
  • Bachelor’s Degree and 5-10 years of experience in related field
  • Strong experience in the field of analyzing the Cyber Threat Landscape in order to determine adversary targeting, tactics, techniques, and procedures
  • Strong research, analytic, writing and briefing skills
  • Proficient in the use of the varied and diverse intelligence analysis tools
  • Expert capabilities to research, create, develop and deliver professional briefings, multimedia presentations, and written reports to both operational and senior leadership levels
  • Ability to work independently, as well as mentoring other team members
  • Demonstrated flexibility, initiative, judgment and discretion
  • Willingness to learn new tools and processes
  • Ability to communicate with both security leaders and technical analysts in a timely and concise manner
  • Must have expert level abilities with standard office software suites
  • Ability to obtain and maintain a United States Secret security clearance
62

Cyber Intelligence Analyst Resume Examples & Samples

  • Ensures technical security improvements are effective and maintained within configuration management structures - Ensures technology employed by the Security Monitoring Team compliments operational processes
  • Analyze the potential impact of new threats and exploits and communicate risks to relevant business units - Monitor the Northrop Grumman Global Network to find anomalous or malicious activity using various analytical methods and Security Event incident Monitoring (SEIM) tools in a high paced operational environment
  • Bachelor's degree in related field plus 2 years related work experience; 0 years with Master's degree or 6 years related work experience in lieu of Bachelor's degree
  • Requires knowledge of, and skill in applying, advanced CNO analysis concepts, principles, practices, laws, regulations,
  • Knowledge with Windows and Linux operating systems and common applications, working knowledge of and experience
63

Senior Cyber Intelligence Analyst Resume Examples & Samples

  • Perform the following functions as individual assignments or as part of a team
  • Maintain situational awareness of cyber activity by reviewing open source reporting for new vulnerabilities, malware, or other threats that have the potential to impact the organization
  • Employ advanced forensic tools and techniques for attack reconstruction, including forensic analysis and volatile data collection and analysis
  • Recommend sound remediation and recovery strategies, suggest defensive policy enhancements and information technology procedures
  • Minimum 5 years Professional technical experience in the information security field
  • Minimum 3 years’ experience working with security technologies including Intrusion Detection & Prevention Systems (IDS/IPS), Firewalls & Log Analysis
  • Minimum 3 years working with SIEM, Network Behavior Analysis tools, Antivirus, and Network Packet Analyzers
  • Minimum 2 years’ experience working with Digital Forensics tools in an Enterprise environment
  • Minimum 2 years conducting Cyber Incident Response activities in an Enterprise environment
  • Advanced knowledge of the Incident Response lifecycle
  • Advanced Knowledge of the TCP and IP protocol suite, security architecture, DNS and remote access security techniques and products
  • Ability to effectively manage multiple, concurrent activities, while understanding and managing priorities, dependencies and risk
  • Strong communication (verbal and written) and interpersonal skills
  • High level of initiative and self-motivation
64

Cyber Intelligence Analyst Resume Examples & Samples

  • Lead efforts in intelligence gathering, intrusion detection, malware analysis, and APT analysis
  • Design and execute remediation efforts within the "Response" phase of cyber incident lifecycle across functions, business units and regions
  • Continuously engage intelligence team in a two way conversation: Develop, refine, and maintain intelligence requirements to focus intelligence in support of detection operations, and provide feedback on detection indicators and intruder tactics, techniques, and procedures
  • Mentor and provide direction to junior analysts, conduct additional triage on escalations from those analysts
  • Conduct cyber investigations of internal or external threats based on a working knowledge of IT environments including: Microsoft Windows, Apple MAC, Linux, mobile devices and infrastructure components such as firewall technology, Active Directory, and operational log and event console activity
  • Evaluate threats from state actors, non-state actors, cyber criminals and activists
  • Identify adversary’s activities, including attribution, tactics, techniques and campaigns
  • Champion use of processes, standards, governance, and disciplined execution
  • Evaluate and use advanced IR products and services to improve efficiency and effectiveness of incident response
  • Lead projects to enhance CSIRT capabilities up to region or sector level
  • A High School diploma from an accredited institution is required
  • Minimum 5 years of experience in cyber security incident response and security operations
  • This position requires use of information or access to hardware which is subject to the International Traffic in Arms Regulations (ITAR). All applicants must be U.S. persons within the meaning of ITAR. ITAR defines a U.S. person as a U.S. Citizen, U.S. Permanent Resident (i.e. ‘Green Card Holder’), Political Asylee, or Refugee”
  • Bachelor’s or Master’s degree in a technical discipline such as: B.E / BTech / MCA / Equivalent (EITC) or B.S. Comp Science / Mathematics / Engineering / Equivalent
  • 10 years of IT experience in information technology
  • 3 years of experience with security technologies (e.g. IPS, IDS, SIEM, DNS, proxies) and detection techniques (e.g. forensics, malware analysis, packet analysis)
  • 3 years of experience in correlating events from multiple sources to detect suspicious and/or malicious activity
  • 3 years of experience evaluating cyber threats
  • 3 years of experience identifying adversary activities (tactics, techniques and campaigns)
  • Deep understanding of multiple Information Security disciplines with relevant work experience and/or relevant certifications (e.g. GCIH, CSIH, GREM, etc.)
  • Deep understanding of common threats, penetration/intrusion techniques and attack vectors
  • Up to 10% travel will be required for this position
65

Cyber Intelligence Analyst Resume Examples & Samples

  • Conducts analysis and interpreting cybersecurity threat intelligence to identify emerging risks and vulnerabilities, quantifies potential impact, and develops conclusions and recommended supervisory responses
  • Analyze threat intelligence reports (proprietary and open source) to identify vulnerabilities, understand how they could be exploited, and the potential impact to the financial sector
  • Demonstrates a broad awareness of cybersecurity events, threats and actors, including trends and emerging systemic risks
  • Prepares and presents oral and written research, analysis, and assessments concerning complex matters to senior management and staff
  • Prepare periodic written risk assessments and other analytical and informational supervisory products as needed or requested
  • Serve as a subject matter expert on information security and cyber security issues, including business continuity and resumption
  • Provide assistance on examinations of varying size and scope to ensure systems are operating in a safe and sound manner and in compliance with applicable banking laws, regulations, and policy statements
  • Coordinate with appropriate Board of Governor and Federal Reserve System staff members on information security and cyber security issues
  • Provide training and/or interpretations to staff as needed
66

All-source Cyber Intelligence Analyst Resume Examples & Samples

  • Cyber Targeting: The candidate will provide assistance in developing the processes and procedures to facilitate all-source intelligence analysis, intelligence support to targeting and targeting to include long range planning and coordinate intelligence and targeting efforts. The candidate will produce required target materials that include, but are not limited to, Electronic Target Folders (ETFs), Target System Analysis (TSA), Battle Damage Assessments (BDA), and technical analysis reports. The candidate will be able to utilize intelligence tools, including MIDB interfaces such as Morpheus, Gemini, and the Joint Targeting Toolbox (JTT) and able to utilize a wide-range of research and analytic tools and techniques to conduct target intelligence, operational research and analysis and to provide recommendations
  • DOD HUMINT and CI in Cyberspace: The candidate will facilitate coordination and deconfliction of planned and on-going DoD intrusion investigations and incident response actions. The candidate will analyze ongoing Information Assurance/Computer Network Defense related activities and make recommendations from law enforcement (LE) perspective. The candidate will provide media analysis assessments and computer threat analysis from an LE perspective while maintaining communications with LE representatives in the Defense Counterintelligence and Human Intelligence Center, counterintelligence representatives internal to JFHQ-DODIN and external to identify changes in the cyber environment
  • Active DoD TS/SCI clearance and eligible for Polygraph
  • Proficient in developing briefing materials, administrative, and logistics support
  • The candidate must have advanced communication and presentation skills (verbal and written) enabling precise conveyance of information across all CC/S/A/FA with command and proper enunciation of the English language. They must also have strong interpersonal, organizational and critical thinking/problem solving skills. The individual needs to be flexible, dependable and be able to multi-task with priorities. Demonstrated experience of providing excellent customer service
  • Demonstrated understanding of cyber advanced persistent threats, actors, infrastructure, and TTP’s
67

Cyber Intelligence Analyst Resume Examples & Samples

  • Perform cyber threat intelligence analysis, correlate actionable security events, perform network traffic analysis using raw packet data, net flow, IDS, IPS, and custom sensor output as it pertains to the cyber security of communication networks, and participate in the coordination of resources during incident response efforts
  • Coordinate resources during enterprise incident response efforts, driving incidents to timely and complete resolution
  • Perform analytic support focused on Cyberspace doctrine, policies, strategies, capabilities, and Cyberspace groups, individuals, organizations, tools, tactics, and procedures
  • Conduct malware analysis of attacker tools providing indicators for enterprise defensive measures
  • Analyze reports to understand threat campaign(s) techniques, lateral movements and extract indicators of compromise (IOCs)
  • Interface with external entities including law enforcement organizations, intelligence community organizations and other government agencies as required
  • Deliver status reports, briefings, recommendations, and findings to management and executives as required
  • Minimum 3 years Professional technical experience in the information security field
  • Minimum 2 years’ experience working with security technologies including Intrusion Detection & Prevention Systems (IDS/IPS), Firewalls & Log Analysis
  • Minimum 2 years working with SIEM, Network Behavior Analysis tools, Antivirus, and Network Packet Analyzers
  • Minimum 1 years’ experience working with Digital Forensics tools in an Enterprise environment
  • Minimum 1 years conducting Cyber Incident Response activities in an Enterprise environment
  • Ability to work autonomously as well as contribute in a team and professional environment
  • Strong focus on customer service and outcome
  • Proven ability to adapt and maintain a flexible approach to changing needs or priorities
  • Strong reporting and analytical skills with attention to detail
  • Strong problem-solving skill with the ability to resolve complex technical issues
68

Cyber Intelligence Analyst Resume Examples & Samples

  • 1 to 2 years as an Analyst in a Security Operation Center or in an Incident Response and Handling role
  • Prior experience with SIEM technologies
  • Expert understanding of network protocols, TCP/IP fundamentals, operating systems along with log, network and system security analysis techniques
  • Clear and concise communication and presentation of complex and complicated security topics
  • Understanding of regular expressions, database structure and queries
  • Understanding of basic network services, vulnerabilities, exploits and attacks
  • Understanding of computer, application and network exploits and vulnerabilities
  • Certifications: GIAC Certified Incident Handler (GCIH) or GIAC Certified Intrusion Analyst (GCIA) preferred
  • Beginner-level proficiency with Malware Reverse Engineering
  • Intermediate-level proficiency with Linux System Administration, Cyber Threat Analysis, Security Incident Response, Vulnerability/Threat Analysis
  • Advanced-level proficiency with Windows Operating System, Technical Knowledge of Hardware & Software
69

Associate Cyber Intelligence Analyst Resume Examples & Samples

  • Collect and analyze digital intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and US and DoD information networks
  • Analyzes network events to determine the impact on current operations and conduct all- source research to determine advisory capability and intent
  • Prepares assessments and cyber threat profiles of current events based on the sophisticated collection, research and analysis of classified and open source information. Correlates threat data from various sources
  • Develops and maintains analytical procedures to meet changing requirements and ensure maximum operations
  • Collects data using a combination of standard intelligence methods and business processes
  • Produces high-quality papers, presentations, recommendations, and findings for senior US government intelligence and network operations officials
  • Knowledge of or indirect experience with customer-specific operations mission, process, and procedures
  • Ability to work and support a 24/7/365 center
  • Proven knowledge of computer hardware/software and strong understanding of computer/ internet communications methods
70

Cyber Intelligence Analyst Resume Examples & Samples

  • All-source intelligence analysts (SIGINT, HUMINT, IMINT, GEOINT, MASINT, ELINT, OSINT, etc.)
  • Technical targeting analysts
  • Imagery analysts
  • Geospatial analysts
  • Reports officers
  • Bachelor’s Degree in Intelligence Studies, International Affairs, Political Science, Cyber Security or other related discipline; four (4) years of additional intelligence analysis experience may be considered in lieu of degree
  • Five (5) years of experience as an intelligence analyst supporting the Intelligence Community, Department of Defense, and/or U.S. military
  • Willingness and ability to adapt to changing customer mission requirements as necessary
  • Active TS/SCI with Polygraph clearance
71

Cyber Intelligence Analyst Resume Examples & Samples

  • Bachelor’s Degree in a technical field and a minimum of 5 years related technical experience required. An additional 4 years of experience may be substituted in lieu of a degree
  • Active TS/SCI with Polygraph is required
  • Experience as an intelligence analyst supporting the Intelligence Community, Department of Defense, and/or U.S. military
  • Open Source GIS Tools (GDAL, GeoServer)
  • Authoring and publishing of Geospatial Services
72

Cyber Intelligence Analyst Resume Examples & Samples

  • Conduct cyber intelligence operations including intelligence collection (especially indicators of compromise/IOCs), tracking threat actors, identifying and tracking malicious assets and infrastructure
  • Respond to research requests from Verizon security businesses and clients with timely and accurate assessments
  • Proactively research relevant threats and produce reports and intelligence products
  • Support prototyping and continuous development/integration of tools to store, exchange, and analyze threat and incident data
73

Cyber Intelligence Analyst Resume Examples & Samples

  • MUST HAVE AN ACTIVE TS/SCI POLY CLEARANCE
  • Shall have a minimum of three years of language or SIGINT experience specializing in DNI, or a minimum of one year of language or SIGINT experience specializing in DNI and a degree (Bachelors) in an applicable field (for example, math, science, engineering, intelligence, language)
  • Shall have demonstrated experience in one or more of the following DNI areas: Experience in digital network analysis, characterization, or exploitation; knowledge of intelligence collection; Knowledge of SIGINT development (SIGDEV) or computer network provider capabilities and workflows; Knowledge of technical metadata or content analysis; Knowledge in language analysis techniques, tool providers, capabilities or workflows; and/or Experience in technical and language exploitation
  • Experience with one or more of the following SIGINT tools: GRAPEVINE; ANCHORY/MAUI; PATHFINDER/UIS; XKEYSCORE; CADENCE; MAINWAY; TININGFORK; or UTT
74

Cyber Intelligence Analyst Resume Examples & Samples

  • Collect and analyze digital intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to USCENTCOM operations and information networks
  • Analyzes network events to determine the impact on current operations and conduct all- source research to determine advisory capability and intent. Prepares assessments and cyber threat profiles of current events based on the sophisticated collection, research and analysis of classified and open source information
  • Correlates threat data from various sources
  • In-depth knowledge of and direct experience with customer- specific operations mission, process, and procedures
75

Cyber Intelligence Analyst Resume Examples & Samples

  • Experience with collecting, analyzing, and interpreting qualitative and quantitative data from multiple sources for the purposes of documenting results, analyzing findings, and developing assessments
  • Experience with computer network operations, information operations, information warfare, or topical cyber-experience
  • Ability to write high-quality intelligence assessments and briefings for a senior-level audience and willingness to provide writing sample, work in a fast-paced work environment, multi-task, and be comfortable with tight delivery deadlines
  • Ability to develop specific expertise, discern patterns of complex threat actor behavior, and communicate an understanding of current and developing cyber threats
  • Bachelor’s degree desired but not required
  • Current TS/SCI, CI Poly (or SCI eligible)
  • Ability to display foreign language proficiency in priority languages, including Arabic, Farsi, Mandarin, Russian or Ukrainian, Portuguese, Spanish, German, Romanian, Latvian, Estonian, Serbo-Croatian, or Korean
  • MA or MS degree in International Relations, Security Studies, Intelligence Studies, Political Science, Regional Studies, Cyber Security, or International Law preferred
  • While performing the duties of this job the employee is regularly required to sit and use hands to finger, handle, or feel while typing at a computer keyboard
  • The employee is occasionally required to stand, walk, reach, or lift objects up to 10 pounds
  • The employee is frequently required to talk or hear. The vision requirements include: close vision
76

Senior Cyber Intelligence Analyst Resume Examples & Samples

  • Leads change within the Threat Intelligence team through leadership, guidance, and creating new processes and procedures to enhance the intel capabilities in support of the Threat Management Center protecting the Verizon Enterprise
  • Identifies gaps in intel gather strategy and leads changes in covering identified gaps
  • Develop, create, and drive current and new reporting methods of Intelligence analysis to peers and leadership teams for purposes of situational awareness and making Intelligence actionable
  • Support mid and junior team members in methods to process tactical mitigations based on results of analysis and determination of threat validity
  • Drives support for the Threat Management Center during incident response and threat monitoring activities to include intelligence context and analysis support, provide industry expertise and recommend relevant remediation and countermeasures
  • Drive the technical oversight and guidance required to support junior team members during Intelligence analysis efforts
  • Write intelligence and technical articles for knowledge sharing
  • Lead strategic projects and develop capabilities to enhance and mature existing cyber Intelligence functions
  • Previous Information Assurance or Cyber Experience in the Telecommunications industry
  • Previous experience working with hunting tools and technologies
  • Fundamentals of Mobile Platforms: Windows Phone, iOS, Android
77

Cyber Intelligence Analyst Resume Examples & Samples

  • Process both internal and external Cyber Threat Intel for determination of potential threat and impact, hunting to determine potential scope, and implementation of mitigations to defend Verizon’s enterprise; this includes reports from law enforcement, security researchers, industry leaders and governmental agencies
  • Support in conducting pivoting analysis on Threat Intelligence to identify current impact or proactively process mitigations for defense through security technologies and proactive mitigations including zero-day patching identification, anomalous behavior, and recommendations of remediation action
  • Aide in development, creation, and optimization of current and new reporting methods of Intelligence analysis to peers and team members for purposes of situational awareness and making Intelligence actionable
  • Support the Threat Management Center during incident response and threat monitoring activities to include intelligence context and analysis support, provide industry expertise and recommend relevant remediation and countermeasures
  • Previous experience in Cyber Intelligence or related disciplines
  • Previous experience working with SIEM technologies (i.e. Splunk)
  • Understanding of Networking (including the OSI Model, TCP/IP, DNS, HTTP, SMTP)
78

Cyber Intelligence Analyst Resume Examples & Samples

  • Serve as a Cyber intelligence analyst on a team that provides cutting-edge, innovative, and thoroughly-vetted finished intelligence products, including high-quality papers, briefings, recommendations, and findings for senior-level government decision-makers
  • Develop and hold regional expertise on Cyber network operations, emerging Cyber threats and trends, and the evolving investigations related to Cyber security
  • Provide regional or functional analytic support, pertaining to a wide-range of Cyber threat actors
  • Perform analytic support focused on Cyber actor TTPS. doctrine, policies, strategies, capabilities, and intent to conduct Cyberspace operations and Cyber-oriented groups, individuals, organizations, tools, tactics, and procedures
  • Experience with Cyber, computer network operations, information operations, information warfare, or topical Cyber-Experience with Microsoft Office
  • Ability to develop specific expertise, discern patterns of complex threat actor behavior, and communicate an understanding of current and developing Cyber threats
  • Ability to leverage well-honed online researching expertise to identify and navigate relevant online forums, including Web sites, social media, and traditional sources to support research and analysis
  • Experience with emerging computer or online technologies, online social behaviors, and computer or Internet slang-Experience with targeting or analysis
  • Arabic background it would be fantastic even though it's not a linguist position), familiarity with the Arabic language, cyber expertise, and/or Middle-East cultural knowledge
79

Cyber Intelligence Analyst Level Resume Examples & Samples

  • Support data gathering through analysis of Incident Documentation and Network perimeter monitoring for the development of presentations, metrics, and reports
  • Will organize malicious activity into appropriate predefined categories related to malware, campaigns, or potential fraud following establish guidelines and procedures. Document Intelligence assessments of this activity into Intelligence Repository capturing Indicators of Compromise that can be used for future network hunting and response
  • Ability to share pre-defined information through established relationships internally within EFX to aide in collective knowledge and understanding a problem-set or actor group
  • Will use new and existing analytical tools to identify and communicate functionality, ease of use, and potential bugs
  • Working with multiple Cyber Intelligence teams, document existing or potential new processes and work through established flows to determine effectiveness and potential problem areas
  • Organizational, time management, customer service and problem-solving skills
  • Must have strong abilities with standard office software suites
  • Basic knowledge of tools used for network security (DLP, NIPS, HIPS, AV, Firewalls, etc)
  • Strong analytical, documentation, and communication skills a must
  • Experience developing professional reports
  • Experience in in-depth evaluation of disparate data sources (trends and reporting)
  • Strong Interest in malware analysis or exploit development
  • Familiarity with creating Indicators of Compromise (IOCs) from external reporting, malware analysis, or incident analysis for integration into operations
  • Experience in connecting disparate data elements in order to identify patterns of behavior in support of Intelligence reporting
80

Senior Cyber Intelligence Analyst Resume Examples & Samples

  • Experience with current and historical Threat Actor Group(s) TTPs
  • Experience with threat intelligence tools & management platforms
  • Knowledge of the principal methods, procedures, and techniques of gathering information and producing, reporting, and sharing intelligence
  • Demonstrated knowledge of common adversary tactics, techniques, and procedures (TTPs)
  • Foundational knowledge in information technology, to include hardware, networking, architecture, protocols, files systems and operating systems
  • Knowledge of network security technologies, log formats, SIEM technologies, and security operations
  • Strong organizational skills and mentoring
81

Cyber Intelligence Analyst, Mid Resume Examples & Samples

  • 5+ years of experience with conducting all-source intelligence
  • Experience with threat intelligence tools
  • Experience with collecting, analyzing, and interpreting qualitative and quantitative data from multiple sources for the purposes of documenting results and analyzing findings to provide meaningful products
  • Knowledge of Microsoft Excel and SQL databases
  • 5 years of experience with Cyber threat analysis, computer network defense, malware, or network intelligence analysis
82

Cyber Intelligence Analyst Resume Examples & Samples

  • Position requires watch standing for a 24/7 Cyber operations center. This role is primarily 5:30 am to 6:00 pm as required, but this individual must be open to working nights when needed (5:30pm - 6am, one or two days a month, possibly more.) Typical shift schedule involves 4 shifts on and 4 shifts off, 3 shifts on, 3 shifts off, resulting in 7 days worked in a 14 day period **
  • Cyber threat experience
  • Open Source Research experience
  • Watch experience
83

Cyber Intelligence Analyst Resume Examples & Samples

  • Conducts research and evaluates technical and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and various information networks
  • Analyzes network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent
  • Be able to conduct telecommunication and/or protocol analysis in order to analyze switching and signaling telecommunication protocols between different nodes in PSTN or Mobile telephone networks, such as 2G or 3G GSM networks, CDMA networks, WiMAX and so on
  • Prepares assessments and cyber threat profiles of current events based on the sophisticated collection, research and analysis of classified and open source information
  • Collects data using a combination of standard/non-standard intelligence methods and business processes. Produces high-quality papers, presentations, recommendations, and findings for senior US government intelligence and network operations officials
  • Applies extensive technical expertise, and has full knowledge of other related disciplines. Must be able to communicate effectively and clearly present technical approaches and findings
  • Level 3 = 5 Years of experience with a Bachelor’s in Science; 3 Years with Masters; 0 Years with PhD. Degree should be in systems engineering, computer science, software engineering, network engineering, information systems security or similar field. 4 additional years of job experience may be substituted in lieu of college degree
  • Level 4 = 9 Years of experience with a Bachelor’s Degree or; 7 Years with Master's Degree or; 4 Years with PhD. Degree should be in systems engineering, computer science, software engineering, network engineering, information systems security or similar field. 4 additional years of job experience may be substituted in lieu of college degree
  • Active/Current Top Secret Clearance with the ability to obtain SCI Access
  • Must be willing to submit to Counter-Intelligence Polygraph as needed
  • Experience with DoD Offensive Cyber Operations, virtual environments and cyber systems design is preferred
  • DODM 8570.01 certifications at IAT/IAM/IASAE Level 2 or 3 are preferred (examples: Security+, Network +, CEH, CCNA, MCSA, MCSE, CISSP, etc)
  • Active Full-Scope Polygraph
84

Cyber Intelligence Analyst Resume Examples & Samples

  • Conducts research and evaluates technical and all-source intelligence with specific emphasis on network operations and
  • Be able to conduct telecommunication and/or protocol analysis in order to analyze switching and signaling
  • DODM 8570.01 certifications at IAT/IAM/IASAE Level 2 or 3 are preferred (examples: Security+, Network +, CEH, CCNA,
85

Cyber Intelligence Analyst Resume Examples & Samples

  • Collects data using a combination of standard/non-standard intelligence methods and business processes. Produces high-quality papers, presentations, recommendations, and findings for senior U.S. government intelligence and network operations officials
  • Bachelor of Science degree plus 5 years of relevant experience, Master of Science degree plus 3 years of relevant experience, or a PhD plus 0 years of experience. Degree should be in systems engineering, computer science, software engineering, network engineering, information systems security or similar field. 4 additional years of job experience may be substituted in lieu of a college degree
  • Bachelor of Science degree plus 9 years of relevant experience, Master of Science degree plus 7 years of relevant experience, or a PhD plus 4 years of experience. Degree should be in systems engineering, computer science, software engineering, network engineering, information systems security or similar field. 4 additional years of job experience may be substituted in lieu of a college degree
86

Cyber Intelligence Analyst Resume Examples & Samples

  • Demonstrated experience with customer tools and databases
  • Knowledge of emerging technologies in the global financial marketplace
  • Experience training and/or briefing others on global financial marketplace topics of interest
  • Experience creating Microsoft Access databases
  • Foreign language capability