Cyber Threat Analyst Resume Samples

4.5 (96 votes) for Cyber Threat Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the cyber threat analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
PH
P Herman
Pierce
Herman
7759 Weber Ford
Philadelphia
PA
+1 (555) 472 1006
7759 Weber Ford
Philadelphia
PA
Phone
p +1 (555) 472 1006
Experience Experience
Dallas, TX
Cyber Threat Analyst
Dallas, TX
Schoen Inc
Dallas, TX
Cyber Threat Analyst
  • Performance management and development for direct reports
  • Assist in the design and development of Security implementations
  • Work with Webster's information security architect to design security services and recommend security architecture improvements
  • Defending networks and develop and defend effects
  • Work with vendors, application developers, database administrators, corporate IT, and other technology groups to resolve any problems
  • Continuing content development of threat detection and prevention systems
  • Identify Cybersecurity threats and perform analysis of reported anomalies on Visa networks and systems
Detroit, MI
SME Cyber Threat Analyst
Detroit, MI
Weber LLC
Detroit, MI
SME Cyber Threat Analyst
  • Assist CNDSP subscribers with comprehending reports and perform supplemental research and guidance on implementing the prescribed risk mitigation strategy
  • Review IA certification and accreditation documentation, programmatic, and technical documentation for the NSOC and Network Protection Suites
  • Execute, draft, edit, and maintain standard operating procedure (SOP) documentation
  • Medical systems; advanced system architecture; hardware technologies; digital/analog communications technologies; applied physics; human factors engineering; computer simulation; electronic sensor technologies; and ERP
  • Perform daily review of cyber threat warnings, bulletins, alerts, and incident reporting documentation and databases
  • Review IA certification and accreditation documentation, programmatic, and technical documentation for each system or program of record serviced by the NSOC CNDSP
  • Perform analysis and identify threats, vulnerabilities, or change to the level of risk associated with continued operations
present
Philadelphia, PA
Senior Cyber Threat Analyst
Philadelphia, PA
Graham, Kuphal and Stracke
present
Philadelphia, PA
Senior Cyber Threat Analyst
present
  • Rapidly develop proof-of-concept or prototypes of analytical methods and work closely with developers to automate these methods
  • Work with law enforcement and business partnerships internationally to investigate cyber crime and threat actors
  • Perform threat research and analysis during high-severity cyber-attacks impacting FireEye customers globally
  • Improve the detection, escalation, containment and resolution of incidents
  • Perform malware reverse engineering and behavioral analysis
  • Provide threat context and integration support to multiple FireEye service lines
  • Provide threat research and context to global service delivery for Mandiant and FireEye-as-a-Service investigations
Education Education
Bachelor’s Degree in Information Security
Bachelor’s Degree in Information Security
Belmont University
Bachelor’s Degree in Information Security
Skills Skills
  • Computer Information Systems Security Professional (CISSP) certification or the ability to obtain within six (6) months
  • Demonstrated ability to create complex scripts, develop tools, or automate processes in PowerShell, Python or Bash
  • Knowledge of networking and the common network protocols
  • Knowledge of computer systems and cyber terminology
  • Threat and vulnerability analysis and assessment technologies: e.g. QualysGuard, NexPose/Metasploit, OpenVAS
  • Ability to analyze network intrusions to create network defense signatures and ID the difference between anomalous and malicious network activity
  • Knowledge of hacker methodology and malware analytic methods
  • 1 year of experience in each of the following: Intelligence Message Handling Systems (MHS), HUMINT online Tasking and reporting (HOTR), and Microsoft Office Suite
  • Technical knowledge of operating systems: e.g. Windows, UNIX, and Macintosh
  • Technical knowledge of networking concepts and systems: e.g. Routing, switching
Create a Resume in Minutes

15 Cyber Threat Analyst resume templates

1

Cyber Threat Analyst Resume Examples & Samples

  • Assess alerts and notifications of event activity from intrusion detection systems and respond accordingly to the threat
  • Continuing content development of threat detection and prevention systems
  • Maintains knowledge of security principles and best practices. Must remain current with emerging threats and trends
  • Leads or participates in information security related projects or in managing strategy
  • Will participate in the evaluation of new security technologies for solutions that should be pursued by the firm
  • Conduct forensic investigations for HR, Legal, or incident response related activities
  • Develop new forensic detective and investigative capabilities using current technical solutions
  • Grow cyber intelligence capabilities and networks
  • Work with various business units and technical disciplines in a security consultant role for cyber threats
  • Data analysis and threat research/hunting
  • B.S. in Computer Science, MIS, or related degree and a minimum of three (3) years of related experience in Information Security or an equivalent combination of education, training and experience
  • Computer Information Systems Security Professional (CISSP) certification or the ability to obtain within six (6) months
  • Knowledge of the following highly preferred
  • Network and endpoint forensic technologies: e.g. FTK, EnCase, NetWitness, TSK
  • Threat and vulnerability analysis and assessment technologies: e.g. QualysGuard, NexPose/Metasploit, OpenVAS
  • IDS technologies: e.g. SNORT, SourceFire, PaloAlto
  • General scripting or programming: e.g. Bash, Powershell, Python, Perl, Ruby, JavaScript
  • General Information Security tools, concepts, and practices
  • Technical knowledge of operating systems: e.g. Windows, UNIX, and Macintosh
  • Technical knowledge of networking concepts and systems: e.g. Routing, switching
2

Cyber Threat Analyst, Senior Resume Examples & Samples

  • 9+ years of experience with IT
  • IAM/IAT Level III Certification
  • BS degree in a CS or IT-related field, including Information Assurance or Security
3

SME Cyber Threat Analyst Resume Examples & Samples

  • Provide support for the ongoing analysis of threats capable of impacting resources being serviced by the NSOC CNDSP activity based on review of programmatic, technical, and IA Certification and Accreditation documentation and daily review of open source / unclassified and classified threat warnings and bulletins
  • Execute, draft, edit, and maintain standard operating procedure (SOP) documentation
  • Review IA certification and accreditation documentation, programmatic, and technical documentation for the NSOC and Network Protection Suites
  • Review IA certification and accreditation documentation, programmatic, and technical documentation for each system or program of record serviced by the NSOC CNDSP
  • Review the SOPs and CNDSP programmatic documentation for the NSOC
  • Perform daily review of cyber threat warnings, bulletins, alerts, and incident reporting documentation and databases
  • Perform daily review of open source / unclassified sources of cyber threat warnings, vulnerability announcements, from the DoD Information Assurance Vulnerability
  • Perform analysis and identify threats, vulnerabilities, or change to the level of risk associated with continued operations
  • Assist CNDSP subscribers with comprehending reports and perform supplemental research and guidance on implementing the prescribed risk mitigation strategy
  • Coordinate and de-conflict threat analysis activities and reporting with existing NSOC IAVM program infrastructure
  • Active high level clearance
  • 2+ years of experience in CND or a related field
  • 18+ years of hands-on experience with Information Technology, to include three of the following areas
  • Program management and strategic planning, Systems Requirements, HIPAA requirements, Medical Systems, Navy Medical, Operational Requirements, Enterprise Strategic Planning, Test & Evaluation, and Training
  • Recognized expert who has demonstrated industry and public service leadership in one or more of the following
  • Medical systems; advanced system architecture; hardware technologies; digital/analog communications technologies; applied physics; human factors engineering; computer simulation; electronic sensor technologies; and ERP
  • 4+ years of experience demonstrating the ability to plan and lead a technical/engineering team in multiple, diverse engineering disciplines
  • Professional Certifications Required: Information Assurance Technical (IAT) Level II, Computer Network Service Provider Analyst (CNDSP-A) with corresponding Operating System certification (CE) 8570 Certification compliance
4

Cyber Threat Analyst Resume Examples & Samples

  • Serves as a primary member of the Cyber Security Incident Response Team (CSIRT) who handles security events and incidents on a daily basis in a fast paced environment
  • Role embodies Cyber Network Defense and a successful CTA will be able to quickly analyze threats, understand risk, deploy effective countermeasures, make business critical incident response decisions, and work as part of a team of individuals dedicated to protecting the firm
  • Shares in a weekly on-call rotation and acts as an escalation point for managed security services and associates of Raymond James
  • Daily responsibilities include, but are not limited to
  • B.S. in Computer Science, MIS, or related degree and a minimum of three (3) years of related experience in Information Security or an equivalent combination of education, training and experience. Experience should include a minimum of two (2) years in conducting Cyber Network Defense and a minimum of three (3) years of experience with incident response methodologies, malware analysis, penetration testing, scripting and/or forensics
  • One or more of the following certifications or the ability to obtain
5

Cyber Threat Analyst Resume Examples & Samples

  • Analyzes, selects, and recommends installation of moderately complex security software, locks, alarm systems, and other security measures to prevent hackers from infiltrating company information
  • Investigates attempted efforts to compromise security protocols. Escalates issues to higher level associates; recommends and implements safeguards and solutions
  • Monitors and analyzes moderately complex security systems for routers, switches and firewalls to ensure proper connectivity and configuration
  • Reviews computer logs and messages to identify and report possible violations of security. Coordinates, documents, and reports on internal investigations of security violations
  • Conducts tests on existing complex data security architecture to determine degree of stability
  • Interacts with client management to understand their security needs. Assists in defining and developing safeguards and solutions based on client's needs; implements procedures to accommodate them
  • Reviews security status reports to oversee system status and potential and actual security violations. Writes reports and communicates to management/client findings
  • Bachelor's degree in information systems security, computer science, or related field preferred
  • Four or more years of experience in information systems security
  • Experience working with domain structures and digital signatures
  • Experience working with firewall theory and configuration
  • Experience working with security systems and implementation procedures
  • Experience with networking
  • 4+ years experience in information systems security management
  • Experience leading a small team
  • Good analytics and problem solving skills for design, creation and testing of complex security systems
  • Good communication skills to interact with team members, management, and support personnel
  • Good analytical and problem solving skills for design, creation and testing of complex security systems
6

Cyber Threat Analyst Resume Examples & Samples

  • Identify Cybersecurity threats and perform analysis of reported anomalies on Visa networks and systems
  • Mitigate and contain identified threats using approved methodologies when detected. Initiate escalation procedures and incident response processes as defined in operational plans
  • Monitor information security alerts though the use of a Security Information and Event Manager (SIEM) to triage, mitigate, and escalate issues as needed while capturing essential details and artifacts
  • Utilize sensor data and correlated logs containing IDS/IPS, AV, Windows events, web proxy, and similar data to establish context and to rule-out false positives
  • Operationalize actionable Threat Intelligence reports from Internal and external sources
  • Coordinate the initial workflow and response for varying case types with internal and external teams
  • Collaborate with operational support staff to ensure they are actively engaged in potential security threats and concerns
  • This position is staffed in shifts supporting a 24x7x365 global security operations center. Analysts work a series of 12-hour shifts (followed by days off) in the daytime and operations are transitioned to another operational site at night. Staff assigned to the operations center are considered critical and may need to cover holidays and weekends, if scheduled. There are opportunities for overtime while working extra shifts to ensure operational coverage when needed
  • ​A minimum of 3 to 5 years of work experience supporting technical or support operations. Previous Security Operations Center experience is strongly desired
  • Strong analytical skills and an ability to quickly learn and adapt to new technologies
  • Experience in operating and administrating Security Information and Event Management (SIEM) platforms
  • Possess functional knowledge and administrative experience on Windows and Unix/Linux Platforms
  • A solid foundational understanding of TCP/IP and networks to include firewalls, routers, and ACLs
  • Strong working knowledge of malware in its varying forms, common delivery mechanisms, and common mitigation steps
  • Ability to convey security concepts related cybersecurity events to both technical and non-technical audiences
  • Experience with IDS/IPS, Splunk, FireEye, and similar technologies is desired
  • A bachelor’s degree in a technical discipline or a professional certification (e.g. CISSP, GCIH) is preferred, but is not required
  • Prior experience with mid-range and mainframe operating environments - Tandem, MVS, TPF, OS-400 is a plus
  • Ability to communicate and collaborate effectively with other team members in a geographic and culturally diverse workforce
7

Cyber Threat Analyst Resume Examples & Samples

  • Role is focused on handling fraud related cyber security events and incidents on a daily basis within a high tempo environment
  • Act as an Incident Handler that can manage minor and major security incidents within the defined Computer Security Incident Response process
  • Act as a core team member with other Cyber Threat Analysts using their cognitive skills to analyze and prevent various threats faced by Raymond James and financial service firms
  • Incumbents will need to understand how the CTC works and apply that knowledge to define problems, design solutions, help engineer systems and deploy products for the benefit of the CTC
  • Cyber-Crime Incident Response
  • External Adversary Incident Response
  • Vulnerability Management and Remediation
  • HR/Legal/Compliance Investigations
  • Content creation for existing systems
  • Proof of concepts for incident response and forensic tools
  • Vendor relations
  • Product research
  • May lead or participate in information security related projects or in managing strategy
  • The CTC shares in a weekly on-call rotation and acts as an escalation point for managed security services and associates of Raymond James
  • B.S. in Computer Science, MIS, or related degree and a minimum of three (3) years of related experience in Information Security or an equivalent combination of education, training and experience. Preferred experience includes a minimum of two (2) years in conducting Cyber Network Defense, experience with incident response methodologies, scripting and content creation across varied technologies
  • Demonstrated ability to analyze large data sets and identify suspicious and/or fraudulent activity patterns
  • Experience with forensic analysis, investigating alerts, identifying trends, and preparing suspicious activity reports
  • Knowledge of forensic software application and other utilities used to collect, process, review and analyze electronic evidence
  • GCFA – GIAC Certified Forensic Analyst
  • GCFE – GIAC Certified Forensic Examiner
  • CHFI – Computer Hacking Forensic Investigator
  • CCE – Certified Computer Examiner
  • CFCE – Certified Forensic Computer Examiner
  • OSCP – Offensive Security Certified Professional
  • GWAPT – GIAC Web Application Penetration Tester
  • GREM – GIAC Reverse Engineering Malware
  • Operating systems, such as Windows, Linux, or OSX
  • Networking and the common network protocols
  • Vulnerabilities and countermeasures
  • Demonstrated ability to create complex scripts, develop tools, or automate processes
  • Demonstrated ability to quickly create and deploy countermeasures under pressure
  • Familiarity with common infrastructure systems that can be used as enforcement points
  • Familiarity with emerging technologies and open source toolsets
8

Senior Cyber Threat Analyst Resume Examples & Samples

  • Adversary Disruption – Leveraging tactical, technical and legal capabilities to eradicate threat
  • Work with law enforcement and business partnerships internationally to investigate cyber crime and threat actors
  • Characterize suspicious binaries and be able identify traits, C2, and develop network and host-based IOCs
  • Identify potential malicious activity from memory dumps, logs, and packet captures
  • Participate as part of a close team of technical specialists on coordinated responses and subsequent remediation of security incidents
  • Provide contextual information to internal Visa's Threat Intelligence team as well as business partners to establish for tactical briefings on threats to the payments ecosystem
  • Undergraduate degree in computer science, engineering, information science, or a related technical discipline
  • 5+ years of related experience in cybersecurity or computer network defense
  • Demonstrated relevant experience as a key member of a threat intel, incident response, malware analysis, or similar role
  • Strong knowledge of malware families and network attack vectors
  • Strong knowledge of web applications and APIs
  • Understanding of payment card processing, related fraud and carding techniques
9

Cyber Threat Analyst Resume Examples & Samples

  • Advanced Cyber Analytics – Driving the hunting of threats to both Visa and the larger payment ecosystem
  • Tactical Intel Coordination – Focusing on partnerships and information sharing, support organizations on strategic direction to mitigate threats
  • Support the investigation and contribution to large and small scale computer security breaches
  • Collaborate with Business Partners in Risk & Fraud on cases, providing technical investigative capabilities
  • Through review and analysis of cyber threats, provide both internal & external parties key information to respond to threat
  • Interact and assist other investigative teams within Visa on time sensitive, critical investigations
  • Analyze intelligence from both Visa's internal threat intelligence data as well as leverage external source for supplemental
  • Undergraduate degree in computer science, engineering, information science, or a related technical discipline preferred
  • 3-5 years of related experience in cybersecurity or computer network defense
  • Strong knowledge of Linux, Windows system internals
  • Scripting, YARA, RegEx and PCRE experience is desirable
  • Certifications such as CISSP a plus, but skill level carries more weight.​
10

Cfsc Cyber Threat Analyst Team Chief Resume Examples & Samples

  • Conduct research and write papers based on the identification of trends, up-an-coming threats, and tailor products to intended customers
  • Manage CIC internal alerting function
  • Manage CIC process for addressing CSFC requirements
  • Initiate and participate in cyber threat intelligence exchanges with private industry financial sector peers and with other Citi lines of business
  • Participate in conference calls with third party intelligence providers to review cyber threat deliverables, intelligence gap support requests, guide analytic discussions and nominate topics to be covered during the calls
11

Senior Cyber Threat Analyst Resume Examples & Samples

  • Rapidly develop proof-of-concept or prototypes of analytical methods and work closely with developers to automate these methods
  • Assist in the design of research experiments and their execution
  • Collect, analyze and evaluate data
  • The ability to convey complex topics in cyber security to individuals in technical positions as well as those in senior leadership
  • Apply expertise in networking or cybersecurity as well as other disciplines to meet emerging needs and challenges
  • Work collaboratively with a team or as an individual on each assigned project to meet deadlines and deliverables
  • Proven capability of adapting to the challenges presented by a rapidly changing threat environment
  • Assist in standing up an Insider Threat detection capability
  • 5 years of relevant experience involving deep understanding of network protocols and technologies as it applies to networking intrusion detection and mitigation
  • Malware handling and reverse engineering
  • Security + or equivalent DoD 8570 compliant certification
  • Active DoD clearance
  • Experience working on investigations involving insider threat
  • Bachelor’s degree in Computer Science or related discipline or equivalent experience
  • Knowledge of the Linux operating environment
  • Basic systems administration skills
  • Possession of a TS clearance
  • Experience working with a multi-agency task force
12

Cyber Threat Analyst Resume Examples & Samples

  • Working knowledge in one or more of the following topics: Industrial Control System Security, Third Party Risks/Threats, Extremist Groups and Cyber Terrorists, Hacktivism, Distributed Denial of Service Attacks, Malware, Mobile or Emerging Threats, Social Engineering, Insider Threats
  • 3+ years of experience in intrusion analysis for large-scale enterprise environment
  • Project management and small team leadership skills
  • Experience collecting, analyzing, and validating open source intelligence
  • Self-starter who takes ownership and responsibility for projects and initiatives
  • Experience with common host and network security protocols and tools
  • Common security controls is required including; authentication, encryption, IDS, input validation, WAFs, firewalls, HIPS, etc.
  • Experience of both Linux and Windows operating systems as well as OS internals
  • Fluent in at least one of the following: Python, Ruby, Power Shell, C#, Bash, Perl, C++
  • SQL and administration skills for at least one major database e.g. Oracle, MSSQL, IBM DB2, Sybase, PostgreSQL or MySQL
  • Certified Information Security Systems Professional (CISSP), GCIH, GPEN or GCIA
  • Understanding of application protocols
  • Experience with packet analysis, Splunk, and OSINT reconnaissance
  • Experience with STIX, TAXI, OpenIOC, and other threat intelligence schemas
  • Experience with Industrial Control System Security
13

Cyber Threat Analyst Resume Examples & Samples

  • Minimum 3 years of IT experience involving security incident handling, firewalls (hosts or network), log review, vulnerability scanning, and packet sniffers
  • Must include experience with a SIEM (e.g., ArcSight, Alienvault, LogRythm, QRadar, Splunk, etc.) and improving effective monitoring and alerting processes for suspicious activity
  • Experience collecting and reviewing recent security news and events for applicability within an environment
  • Strongly prefer relevant security certification(s) like
14

Cyber Threat Analyst Resume Examples & Samples

  • Ability to monitor and analyze logs and alerts from a variety of different technologies, including IDS/IPS, firewall, proxies, and anti-virus across multiple platforms
  • Ability to leverage online research tools to identify and navigate online forums, specialized Web sites, social media, and traditional sources
  • Ability to coordinate and respond to events on all of the monitored networks and the systems on those networks
  • Experience in Cybersecurity analysis, incident response, or a related field with progressing responsibility
  • Experience with Splunk or ArcSight
  • Possession of excellent oral and written communication skills in a professional consulting environment
  • BA or BS degree in Information Security, CS, or Cybersecurity
15

Cyber Threat Analyst, Mid Resume Examples & Samples

  • 3+ years of experience with Cyber operations, including incident response, host and network forensics, system security penetration testing and vulnerability management, security information management, or security event management
  • Experience with testing tools, including Nessus, Metasploit, nmap, BurpSuite, Kismet, Nipper, Wireshark, Kali, SIFT, FTK, or Encase
  • Experience with configuring, administering, and troubleshooting operating systems, including UNIX, Linux, Windows, and Mac
  • Experience with analyzing results and writing assessments and test reports
  • Experience with Cyber network and host forensics, including pcap analysis and memory and file system analysis
  • Experience with the project management framework
  • Knowledge of databases, applications, and Web server design and implementation
  • Possession of excellent team leadership, development, and client relationship skills
16

Cyber Threat Analyst Resume Examples & Samples

  • 5+ years of experience as a Cybersecurity Engineer, SOC, Malware Analyst, or Threat Analyst
  • Experience with malware analysis, reverse engineering, or computer forensics
  • Experience with exploitation and remediation of computer systems and network infrastructure
  • Experience with using Windows and UNIX
  • Knowledge of information assurance principles and applications
  • Knowledge of basic Internet protocols, including TCP/IP
  • Ability to perform network forensics with tools, including Wireshark or Networkminer
  • Ability to review and analyze raw packet and netflow data and identify Cyber threat TTPs
  • Current TS/SCI clearance with a polygraph
  • Experience with programming languages, including Perl or Python
  • Experience with virtual machines
  • Experience with writing and editing SNORT signatures
  • Experience with digital forensics or malware analysis
  • Active Cyber certificates, including Certified Ethical Hacker, Certified Information Systems Security Professional, GIAC Certified Incident Handler, GIAC Security Essentials, or Security+ Certification
17

Intelligence Analyst Iv-cyber Threat Analyst Resume Examples & Samples

  • Provide integrated CI cyber-technical analytic expertise to customer
  • Conducts cyber analytical activities, evaluation of information/technical/physical security systems and practices, cyber investigations, and related duties
  • Identify, investigate and analyze cyber events of CI significance
  • Adapt and develop tools for applying standard cyber security and analysis practices to the CI mission
  • Perform all source intelligence analysis to determine and report on characteristics of various systems/issues and other project/program objectives
  • Analyze networks to identify security vulnerabilities and intrusion detection parameters
  • Report changes, trends and implications of evolving issues
  • Collect data, analyze results, and prepare reports relating to project/program objectives
  • Integrate research results and analysis into operations
  • Establish liaison between customer and interagency partners
  • Demonstrated creativity, innovation, flexibility, and analytical skills in problem solving
18

Cyber Threat Analyst Resume Examples & Samples

  • Liaison with other groups within IT Security and the business Units
  • Analyze and report cyber threats as well as assist in deterring, identifying, monitoring, investigating and analyzing computer network intrusions
  • Bachelor's degree in Computer Science, Computer Engineering, or equivalent education / professional experience, with 4+ years of experience directly related to technical aspects of cyber security
  • Ability and willingness to accept direction, support leadership vision, and to serve as a leader for ad-hoc incident response teams consisting technical personnel directly supporting incident response, system owners, and executives
  • Experience supporting or leading incident response
  • Working knowledge of networking concepts and web technologies
  • Working knowledge of WAN/LAN concepts and technologies
  • GIAC Certified Incident Handler (GCIH) or
  • Certified Information Systems Security Professional (CISSP) or
  • GIAC Network Forensics Analysts (GNFA) or
  • GIAC Reverse Engineering Malware (GREM) or
  • Certified Ethical Hacker (CEH)
  • Bachelor's degree in Computer Science, Computer Engineering, Information Technology or equivalent education/experience, with 4+ years of experience directly related to technical aspects of cyber security
19

Cyber Threat Analyst Resume Examples & Samples

  • Interact daily with the team members and with other teams
  • Triage, process, analyse, and disseminate alerts, report ans briefings
  • Provide cyber threat analysis
20

Cyber Threat Analyst Resume Examples & Samples

  • Bachelor’s Degree and a minimum of 5 years’ experience required for the level 3 role
  • Strong verbal and written skills when communicating with all levels of technical expertise
  • Basic understanding of Network Administration and Network Security is required
  • Basic understanding of cyber security and cyber threats is required
21

CIC Csfc Cyber Threat Analyst Resume Examples & Samples

  • Perform cyber threat analysis and reporting from both internal and external sources
  • Initiate and participate in cyber threat intelligence exchanges with other Citi lines of business
  • Interact daily with the Citi CIC and Cyber Security Fusion Center staff members globally
  • Provide cyber threat analysis to support CIC Intelligence Product development and research
  • Develop and further relationships with personnel at other financial institutions, government agencies and other appropriate organizations
  • Should be familiar with a variety of structured analytic techniques to generate and test a hypothesis, assess cause and effect, challenge analysis, and support decision making. Examples of these techniques include, but are not limited to
  • Third Party Risks/Threats
  • Extremist Groups and Cyber Terrorists
  • Malware
  • Mobile Threats
  • Emerging Threats
  • Must be a self-starter, self-motivated and able to work independently with little oversight in a fast-paced task force environment
  • This position will report to the Cyber Intelligence Center (CIC) ASPAC Team Chief and will be matrixed to the CIC External Liaison/Client Services Representative in Singapore
  • The CIC ASPAC Team Chief reports to the CIC Intelligence Analysis Manager
  • The CIC Intelligence Analysis Manager reports to the CIC Director
22

Cyber Threat Analyst Resume Examples & Samples

  • A bachelor’s degree in computer engineering, computer science, cyber security, or other closely related IT discipline
  • Proven ability to collaborate with technical, highly performing teams
  • Minimum of five (5) years experience in cyber security analysis, incident response, or related experience
  • Good interpersonal and organizational skills and excellent writing, communications and briefing skills
  • 8570-compliant IAT Level I or CND-A
  • Previous experience as Cyber Threat Researcher or Cyber Intelligence Analyst
  • Research experience in tracking cyber threat and malware campaign activity
  • Tool agnostic ability to conduct preliminary malware analysis
  • Ability to create, modify, and implement both Snort and YARA signatures
  • Prior experience in network forensics with an emphasis on detecting malicious activity using network traffic
  • Strong understanding of Operating Systems and Network Protocols
  • Experience doing dynamic malware analysis
23

Cyber Threat Analyst Resume Examples & Samples

  • Perform monitoring, analysis/investigation and escalation of real-time security events
  • Provide timely detection, identification and containment of possible cyber-attacks/intrusions
  • Determine the effectiveness and impact assessment of an observed attack
  • Additional responsibilities will include reporting, documenting cyber security events, as well as supporting the team in cyber security related matters
  • 3 years experience in a similar field
24

Cyber Threat Analyst Resume Examples & Samples

  • 5+ years of experience in a Cybersecurity related role, including threat analyst, Malware analyst, or SysAdmin
  • Experience with using Windows, *NIX, and Mac OS X operating systems
  • Experience with technical writing
  • Knowledge of basic Internet protocols (TCP/IP)
  • Ability to perform network forensics with tools such as Wireshark or Networkminer -Ability to review and analyze raw packet and netflow data
  • Ability to identify Cyber threat TTPs
  • Experience with writing or editing SNORT signatures
  • Active Cyber certificates, such as CEH - Certified Ethical Hacker, CISSP - Certified Information Systems Security Professional, GCIH - GIAC Certified Incident Handler, GSEC - GIAC Security Essentials, or GREM - GIAC Certified Reverse Engineering Malware
25

Cyber Threat Analyst Resume Examples & Samples

  • 15+ years of experience with communication, network, and Cyber
  • Experience in conducting threat analysis
  • BA or BS degree in Information Security or Network or Cyber Security
  • Experience with working C2 application through effective integration of air, space, and Cyber capabilities
  • SSCP or CISSP Certification preferred
26

Cyber Threat Analyst Resume Examples & Samples

  • Maintains knowledge of security principles and best practices
  • Must remain current with emerging threats and trends
  • B.S. in Computer Science, MIS, or related degree and a minimum of two (2) years of related experience in Information Security or an equivalent combination of education, training and experience. Preferred experience includes a minimum of two (2) years in conducting Cyber Network Defense, experience with incident response methodologies, scripting and content creation across varied technologies
  • Familiarity with emerging technologies and open source tool sets
27

Open Source Cyber Threat Analyst Resume Examples & Samples

  • Experience with Cyber, computer network operations, information operations or information warfare, or topical Cyber expertise
  • Knowledge of current and developing Cyber threats
  • Ability to write high-quality intelligence assessments and briefings for a senior-level audience
  • Ability to apply online researching expertise to identifying and navigating relevant online forums, specialized Web sites, social media, and traditional sources to support research and analysis
  • Ability to operate in a fast-paced work environment, multi-task, and be comfortable with truncated delivery deadlines
  • BA or BS degree in International Relations or Security Studies, Intelligence Studies, Political Science, Regional Studies, or International Law
  • Experience with computer forensics or informational assurance
  • Experience with emerging computer or online technologies, online social behaviors, and computer and Internet slang
  • Experience with targeting or analysis
  • Ability to conduct research using a foreign language, including Arabic, Farsi, Korean, Mandarin, or Russian
  • Ability to provide a writing sample
  • Secret clearance preferred
  • MA or MS degree in International Relations or Security Studies, Intelligence Studies, Political Science, Regional Studies, or International Law
  • Cybersecurity Certification, including Security+, Network+, CEH, or similar
28

Cyber Threat Analyst Resume Examples & Samples

  • A Bachelor’s Degree in a technical field and a minimum of 9 years related technical experience required
  • Cyber threat analytics experience required
  • Advanced technical and verbal communications skills
  • Familiarity with SOC/NOC operations, cyber kill chain for incident response and various security technologies such as IDS/IPS and HBSS
  • Active DHS EOD at the SCI level
  • Customer service experience and/or direct experience in support of one of the 16 critical infrastructure sectors
29

Cyber Threat Analyst Resume Examples & Samples

  • Ability to develop specific expertise, discern patterns of complex threat actor behavior, and communicate a comprehension of current and developing Cyber threats
  • Experience with Cyber security analysis, incident response, or related field
  • Experience with HBSS, Splunk, or ArcSight
  • BA or BS degree in Information Security, CS, or Cyber Security
30

Senior Cyber Threat Analyst Resume Examples & Samples

  • Attend NCFTA-hosted meetings and calls representing Citi’s interests
  • Actively monitor and research cyber threats with a direct or indirect impact to the Citi brand, region business operations, technology infrastructure and client trust
  • Triage, process, analyze, and disseminate CIC alerts, reports, IIRs and briefings
  • Should possess a basic understanding of the cyber threat Kill Chain methodology to ascertain the impact of an attack and develop threat trends to assist the mitigation work centers and personnel in developing mitigation techniques and countermeasures which can prevent or lessen the effects of future cyber attacks
  • 5+ years working in a cyber threat intelligence job function
  • 2+ years working in a cyber fraud analysis related function
31

Cyber Threat Analyst Resume Examples & Samples

  • 1+ years of experience with developing formal reports, informal reports, and briefings, including executive-level correspondence
  • Experience with Windows Server and Microsoft desktop patching
  • Experience with reading and validating eEye Retina and Tennable Nessus vulnerability scan reports
  • Experience with vulnerability management, AF network operations, and AF organizational constructs
  • Knowledge of the use of Powershell or Command line
  • DoD 8570.1 Certification, including Security+
  • Experience with scripting in multiple languages
  • Experience in collaborating with multiple organizations and stakeholders
  • Knowledge of AF Cyberspace operations, training, and tactics, techniques, and procedures
  • Ability to be detail oriented and work under pressure as part of a team
32

Senior Cyber Threat Analyst Resume Examples & Samples

  • 7+ years of analytical with technical writing experience (applicable education or training may be counted toward this total)
  • Leadership of mid-sized teams
  • Strong analytical skills and the ability to effectively research, write, communicate and brief to varying levels of audiences
  • Prior military or intelligence community experience and formal analytic training/certification
  • Experience with All Source production and Fusion Analysis
  • Recent or current experience with geopolitical events in the Middle East / North Africa region
33

Cyber Threat Analyst Resume Examples & Samples

  • Utilize ArcSight (similar program to Splunk/LogRythm) to correlate events and identify indicators of threat activity
  • Utilize intelligence regarding threat capabilities to develop IDS/IPS signatures
  • Conduct log file analysis to identify indicators of compromise
  • Report suspected threat activity to the requirements manager and incident handlers for ticketing and assignment to a DCOD for response
  • Refine and apply a variety of analytical methods and models to help transform large sets of data into knowledge to identify threat and threat activity on Army networks
  • Coordinate and provide guidance, assistance, and recommended courses of action to ensure compliance with DoD and Army IA policies for threat mitigation and incident handling
  • Engage stakeholders across DoD, collect and assimilate data, define business rules, and communicate the analysis to clients and leadership
  • 3-7 years of experience with DoD Cybersecurity Computer Network Defense regulations and requirements
  • 3+ years of experience with threat intelligence, incident handling, or supporting computer network defense
  • 3+ years of experience with quantitative analysis, analytical methods, or data analysis
  • 2+ years of experience with quantitative statistical, data analysis, or data visualization programs, including Tableau, R, or Stata-Experience with Microsoft Office, including Word, Excel, and PowerPoint
  • Ability to communicate with diverse stakeholders having different levels of expertise in Cybersecurity
  • Ability to work effectively with minimal client direction and to clearly explain the process, approach, model, analysis, or solution to non-technical stakeholders
  • DoD 8570 Professional Compliance IAT I Certification, including CEH, CISSP, or Sec+
34

Senior Cyber Threat Analyst Resume Examples & Samples

  • Support national CI initiatives through development and oversight of the planning, coordination, and system integration of related information technology solutions
  • Review requests for information and provide recommendation on technical CI matters to include preparation of senior level talking points
  • Serve as liaison between customer and industry to ensure national CI policies and initiatives are being properly supported from a technological perspective
  • Perform customer-directed technical analysis and reporting as required
  • Perform systems, external, internal, and independent analysis functions where appropriate and provide assessment of current CI enterprise tools and techniques being used and measurements of their effectiveness
  • Support continued innovation in technical CI capabilities and identification of threats by collaborating with government and industry counterparts
  • Support management of CI policies and directives including coordinating with government organizations to ensure related program technological objectives are met
  • Combine subject matter and mission expertise to analytic approaches using both quantitative and qualitative methods of analysis to provide support to customer programmatic processes
  • Recommend solutions to improve CI methods and support the follow-on needs for CI initiatives
  • Minimum Bachelor of Science (engineering, mathematics, physics or field related preferred)
  • Requires 10+ years of cyber threat experience to include extensive knowledge and understanding of CI issues and priorities
  • Experience participating in interagency working groups and forums to include ability to produce detailed finished reports
  • Masters or military senior service college desired
35

Open Source Cyber Threat Analyst Resume Examples & Samples

  • Ability to write high
  • Quality intelligence assessments and briefings for a senior
  • Level audience
  • Ability to operate in a Fast-paced work environment, Multi-task, and be comfortable with truncated delivery deadlines
36

Cyber Threat Analyst Resume Examples & Samples

  • Ups which describe security issues, analysis, and remediation techniques to client leadership
  • Ability to monitor and analyze logs and alerts from a variety of different technologies, including IDS/IPS, firewall, proxies, and anti
  • Virus across multiple platforms
37

Cyber Threat Analyst Resume Examples & Samples

  • 5+ years of experience in a Cybersecurity role, including SOC, threat analyst, malware analyst, or system administrator
  • Experience with using Windows and UNIX operating systems
  • Knowledge of common protocols, including DNS, TLS/SSL, HTTP, SMTP, SSH, TCP, UDP, and IP
  • Ability to perform packet and protocol analysis with tools, including Wireshark or tcpdump
  • Ability to work independently with minimal supervision
  • Experience with the US military or DoD
  • Experience with programming languages and Web technologies, including Bash, Perl, Python, PHP, Java, JavaScript, and HTML
  • Knowledge of intrusion detection fundamentals
  • Possession of excellent oral and written communication skills, including briefs and presentations
  • Cyber Certification, including Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), GIAC Security Essentials (GSEC), or Security+
38

Cyber Threat Analyst Resume Examples & Samples

  • Analyzing cyber threat data and intrusion activity to develop tools to aid cyber investigations
  • Increasing awareness of adversary tactics and techniques across the organization, law enforcement community, and other mission partners
  • Working closely with cyber threat intelligence analysts, intrusion analysts, and incident responders to develop unique ways to present data that helps them effectively and efficiently meet their mission objectives; and
  • Development of prototypes, interfaces, or other solutions in support of sponsor initiatives
  • Solid foundation in performing cyber threat and cyber intrusion analysis leveraging security tools, such as packet/protocol analyzers, password crackers, and packet sniffers
  • Experience working in a heterogeneous operating environment (i.e., one comprised of Linux, Unix, Mac, and Windows operating systems)
  • Knowledge with one or more of the following: cyber threat intelligence analysis, media forensics, malware analysis, intrusion analysis, security systems engineering, and incident response
  • Passion for developing solutions to support investigations and cyber intrusions affecting national security
  • Ability to communicate with both technical and non-technical individuals to shape requirements and identify the best solution
  • Analytical experience with various IC databases
  • Knowledge of the different needs and requirements that drive intelligence, law enforcement, and operational missions
  • Experience translating analyst needs in to technical requirements
  • Ability to perform hands-on development, test and evaluation, and demonstration of proof-of-concept and prototype systems
  • Ability to develop signatures to detect malware/intrusion activity
  • Experience with collaborative development environments
  • Experience with cyber analytical techniques and methodologies
  • Experience with law enforcement investigative activities, especially those related to cyber intrusions
  • Experience regularly briefing and advising senior executives
  • Demonstrated proficiency in one or more scripting languages (e.g., Python, Perl, shell)
  • Must be detail oriented with strong writing skills
39

Cyber Threat Analyst Resume Examples & Samples

  • Collaboration with government and contractor cyber threat analysts to satisfy requests for information from stakeholders throughout the SOF enterprise
  • Submission of SOF-focused, regional/global assessments on trending topics in Cyberspace for the J239 Daily Cyber Intelligence Update approximately twice per week
  • Submission of SOF-focused, regional/global assessments of trending topics in Cyberspace for the J2 Intelligence Highlights partner nation approximately once per week
  • Presentation to senior decision/policymakers at the Combatant Command, Joint Staff and USDI-level of a bi-monthly, SOF-relevant briefing on threats to the SOF Information Environment (SIE)
  • Evaluation of Intelligence Information Reports, Telegraphic Disseminations (TDs) and other raw traffic used in the production of finished products (Daily Intelligence Updates, J2 Intelligence Highlights, briefings, assessments, etc.)
  • Submission of a cyber-focused Joint Intelligence Preparation of the Environment (JIPOE) product and Intelligence Preparation of the Battlefield (IPB)
  • Participate in cyberspace-related, community of interests Video Teleconferences (VTC) and other venues
  • Present key technical intelligence to senior decision/policymakers at the Combatant Command, Joint Staff and USDI-level
  • 1 year of experience in each of the following: Intelligence Message Handling Systems (MHS), HUMINT online Tasking and reporting (HOT-R), and Microsoft Office Suite
40

Cyber Threat Analyst Resume Examples & Samples

  • Current events in Cyber Security and associated patching and remediation efforts
  • Unix / Linux operating systems
  • IP Tables/Packet filter firewalls
  • Scanning technologies
  • Log collection and analysis tools
  • Information security, web server administration, or networking
  • English: Demonstrated Fluency
41

Cyber Threat Analyst Resume Examples & Samples

  • Strong knowledge of business intelligence and analytics, including supply chain risks
  • Strong knowledge of Cyber Threat Intelligence (CTI) principles to include indicators of compromise (IOC) types, indicator pivoting and indicator attribution strength
  • Strong understanding of US Intelligence Community and how cyber intelligence organizations work together for purposes of conducting cyber threat analysis
  • Intermediate ability to present technical information and analysis to groups (Candidate will be required to brief up to 50 persons on a quarterly basis and smaller groups of up to 10 persons on a weekly basis)
  • Strong familiarity with the damage assessment process, specifically regarding data compromised as a result of adversary intrusions into contractor networks
42

Program Analyst / Cyber Threat Analyst Resume Examples & Samples

  • Strong knowledge of general intelligence analysis principles governing the collection and evaluation of raw intelligence as well as the production and publication of finished intelligence
  • Familiarity with DoD Damage Assessment Management Office (DAMO) Program guiding documents and mission (DFARS Procedures, Guidance, and Information (PGI) 204.7303-4 DoD damage assessment activities)
  • Analyst experience in a Federal Cyber Center or corporate computer incident response team
43

Cyber Threat Analyst Resume Examples & Samples

  • Responsible for managing external threat related cyber security events and incidents on a daily basis in a fast paced environment with limited oversight
  • Prioritizes and differentiates between potential external threat intrusion attempts and false alarms
  • Acts as an Incident Handler to manage both major and minor security incidents within the defined Computer Security Incident Response process
  • As a core Cyber Threat team member, responsible for analyzing situations and preventing various threats faced by Raymond James and the industry as a whole
  • Performs external adversary incident response (Host and Network)
  • Responsible for confidential HR/Legal/Compliance investigations. Incumbents must be able to review sensitive data and maintain strict confidentiality
  • Creates content for existing systems
  • Is responsible for scripting and automation
  • Minimum of two (2) years in conducting Cyber Network with incident response methodologies, scripting and content creation across varied technologies
  • Ability to work hours outside of normal work schedule as needed
  • Ability to provide on-call support on a rotating basis
  • Knowledge of the following required
  • Ability to analyze large data sets and identify suspicious and/or fraudulent activity patterns required
  • Experience with forensic analysis, investigating alerts, identifying trends, and preparing suspicious activity reports required
  • Forensic software applications, a SIEM, IDS’s, Anti-Virus applications and other security related utilities used to collect, process, review and analyze electronic evidence required
  • CISSP - Certified Information Systems Security Professional
44

Cyber Threat Analyst Resume Examples & Samples

  • 5+ years of experience with technical Cybersecurity
  • 4+ years of experience in one or more of the following: Intrusion detection systems, malware analysis, threat research and intelligence, incident response, vulnerability management, or network or perimeter engineering
  • 3+ years of experience with risk and vulnerability assessments against computer networks
  • 2+ years of experience with Perl and Python scripting
  • Experience with Bash and PowerShell scripting
  • Knowledge of Linux and Windows, including common configuration flaws, mitigating strategies, and network protocols
  • Knowledge of the functionality and capabilities of computer network defense technologies, including Router ACLs, Software Defined Networking, Firewalls, Host or Network IDS and IPS, Antivirus, and Web content filtering
  • 2+ years of experience with Splunk, ArcSight, or Elasticsearch
  • 1+ years of experience with penetration testing computer networks or applications
  • Experience with FireEye, BlueCoat, Splunk Core and Enterprise Security, Ironport, BRO IDS, Cisco Web Proxy, or SourceFire IDS
  • Offensive Security Certified Professional, Certified Information Systems Security Professional, GIAC Certified Incident Handler, GIAC Security Essentials, Certified Ethical Hacker, or Security+ Certification
45

Cyber Threat Analyst, Senior Resume Examples & Samples

  • 4+ years of experience with open source Cyber threat research (OSINT), including technical and non-technical sources
  • Experience with applying online investigation expertise to identifying and navigating between online forums, social media, infrastructure records, automated malware analysis, and traditional news and research publications to support research and analysis
  • Experience with translating analytic product requirements into sequenced research plans, production timelines, and reports and presentations appropriately structured for client needs
  • Knowledge of prominent advanced persistent threat (APT) groups and campaigns, notable Cyber events and trends, and common tactics, techniques, and procedures associated with various threat actor categories
  • Ability to critique and edit the logic, structure, style, and accuracy of intelligence assessments generated for senior-level audiences
  • Ability to provide a writing sample demonstrating analytic rigor, writing clarity, and online research expertise
  • 5+ years of experience in a professional work environment
  • Experience with designing or critiquing organizational Cybersecurity strategies
  • Experience with digital forensics or information assurance
  • Experience with structured Cyber threat analysis frameworks, including Kill Chain analysis, Cyber Intelligence Preparation of the Environment (CIPE) modeling, or Diamond modeling of Cyber threat activity
  • Experience with unclassified threat actor targeting
  • Knowledge of general strategies and objectives of prominent nation states conducting Cyber operations, including expertise in Cyber threat environments in various regions
  • Ability to show completion of formal training in Cybersecurity principals, including Security+, CEH, or CISSP
  • Ability to automate threat data collection and analysis using scripting languages, including Python
46

Cyber Threat Analyst, Senior Resume Examples & Samples

  • 2+ years of experience with open–source research and writing (OSINT) about Cyber threats
  • Experience with identifying and navigating between technical and non–technical online sources to support research and analysis, including English and machine–translated news and research publications, infrastructure records, automated malware analysis, online forums, and social media
  • Knowledge of prominent advanced persistent threat (APT) groups and campaigns, notable events and trends, and common tactics, techniques, and procedures associated with various threat actor categories
  • Ability to critique and edit the logic, structure, style, and accuracy of short– and long–form intelligence assessments generated for senior– and operator–level audiences
  • Experience with structured Cyber threat analysis frameworks, including Kill Chain analysis, Cyber Intelligence Preparation of the Environment (CIPE) modeling, or Diamond modeling of Cyber threat activities
  • Completion of formal training in Cybersecurity principals, including Security+, CEH, or CISSP Certification
47

Cyber Threat Analyst Resume Examples & Samples

  • Assist in the design and development of Security implementations
  • Develop and implement standards and operating procedures
  • Maintain proper change management documentation for all hardware and software modifications
  • Conduct routine hardware and software audits of all supported security devices to ensure compliance with established standards, policies, procedures, and requirements
  • Participate in the Cyber Incident Response Team (CIRT)
  • Lead and ensure the fulfillment of team responsibilities including
  • Perform all required operational maintenance and troubleshooting of supported security assets
  • Perform daily backup and recovery operations for the supported security assets
  • Participate in disaster recovery planning, development, exercises, and actual events
  • Evaluate and test software changes and updates supplied by vendors, prior to installation
  • Work with vendors, application developers, database administrators, corporate IT, and other technology groups to resolve any problems
  • Provide reliable 24 x 7 support
  • Performance management and development for direct reports
  • Participate in budgeting and purchasing processes
  • Bachelors Degree in Computer Science, Information Systems, Engineering or other related field
  • Certification(s) in Information Security; CISSP, CISM, ISSEP, CISA or SANS and technical certification in Cisco, Microsoft, Linux or Unix
  • Must have excellent planning, organizational, verbal and written communication skills
  • Must have the ability to work well with people from varying disciplines with varying degrees of technical experience
  • Strong LAN/WAN infrastructure knowledge, technical writing skills and comprehension of technical manuals
  • This position requires a thorough understanding of diverse system and network architectures
48

Cyber Threat Analyst Resume Examples & Samples

  • 4+ years of experience with performing malware analysis
  • Experience with debuggers, de–compilers, static, dynamic, and memory analysis tools, including Volatility, Sysinternals Suite, and Wireshark
  • Experience in reverse engineering software binaries
  • Experience with memory forensics, decryption, and decoding capabilities
  • Experience with using disassemblers, including IDA Pro and using debuggers, including OllyDbg, Immunity, or WinDbg
  • Experience with using hex editors and tools, including BinDiff
  • Ability to extract indicators of compromise from malicious files and suggest detection and mitigation strategies
  • Ability to write reports, documenting the results of malware analysis and relevance to the client's mission
  • Experience with C/C++ development
  • Experience with x86 assembly language and other assembly languages and platforms, including ARM, x86_64, and PowerPC
  • Experience with user mode and kernel–level debugging
  • Experience with writing, reading, and modifying YARA signatures
  • Experience in working with Cuckoo Sandbox
  • Experience with DoD civilians, military, and government contractors
  • Experience with software development or scripting specifically in regards to Python, PowerShell, Batch, HTML, C#, or .NET
  • Knowledge of static and dynamic reverse engineering, including Cuckoo, Volatility, IDA, Olly, and FTK
  • Knowledge of on–board avionics, including air or space platforms, spacecraft hosts, or payloads
  • Knowledge of off–board support systems, including AFSCN, mission planning, scheduling, tasking, and maintenance
  • Knowledge of Windows Portable Executable (PE) and Executable and Linkable Format (ELF)
  • Knowledge of transmission protocols and technologies, including IP, FTP, ICMP, and SNMP
  • BS degree in Computer Science, Information Assurance, or a related field preferred
  • Network+, Security+, CEH, or GIAC Reverse Engineering Malware (GREM) Certification
49

Cyber Threat Analyst Senior Resume Examples & Samples

  • Develop, gather, maintain and continuously evaluate cyber, threat intelligence data sources (technical & non-technical) to increase effectiveness cyber threat information in managing business risks and integrate them into a threat framework
  • Maintain an understanding of the overall threat landscape (malware, botnets, phishing, DDoS, fraud, etc.)
  • Grow and manage the monitoring of daily intelligence operation feeds, analyses and development of baselines for all related risks from Security Analytics and/or other log management tools
  • Cyber security use case requirement gathering, perform large-scale data analysis and develop effective statistical and machine learning models for improving Cybersecurity capabilities
  • Collect, analyze, investigate, store, and disseminate indicators of compromise (IOCs), threat intelligence, brand infringements, etc
  • Regularly develop and produce written cyber threat intelligence reports (tactical and strategic) based on intelligence feeds and performing targeting profile collection, data processing and analyses. Analyzing and contextualizing cyber threat intelligence data into actionable intelligence
  • Partner with incident response, network security, physical security, marketing, legal, and other teams
  • Utilizing cyber forensics knowledge to analyze, draft, edit, and disseminate threat intelligence information/briefs to stakeholders, executive leadership, and others
  • Support the delivery of Cyber Security maturity improvements across the organization, in line with the changing Threat Landscape, Regulatory and Compliance requirements etc
  • Candidate with prior penetration testing background highly encouraged to apply
  • Certifications
  • One or more of the following Certification(s): GCIA,GCFE, CEH, RHCE, CISSP, CISA
  • Strong knowledge in Cyber Crime, Malware, Hacktivism, Vulnerability & Exploitation, Social Engineering, Insider Threats, Cyber Threat Intelligence
  • Experience working in this area (intelligence, information security, network forensics, insider threat)
  • Knowledge of ISO27000 series, NIST SP 800 series, NIST Cyber Security Framework and FIPS or other information security framework policies, procedures, guidelines, and methodologies desired
  • Familiarity of the Diamond Model, Kill Chain methodology, and Pyramid of Pain
  • 7+ years overall IT Infrastructure experience
  • Minimum of 5+ years of recent operational security experience (SOC, Incident Response, Forensics, Malware Analysis, IDS/IPS Analysis, etc.)
  • Strong experience with Open Source Intelligence (OSINT), Deep/Dark Web threat data and intelligence sources
  • Familiarity with one or more structured cyber threat intelligence formats, including STIX, CybOX, MAEC, and OpenIOC
  • Comfort analyzing large, complex, high-dimensional datasets. Experience working with distributed computing tools a plus (Hadoop, PIG, etc.)
  • In-depth familiarity with multiple threat groups, to include both cyber-crime groups and suspected cyber-espionage campaigns, and familiarity with their typical Tactics, Techniques, Procedures
  • Demonstrated knowledge of the SIEM search techniques, alerts, dashboards and report building
  • Detailed understanding of the OSI model, TCP/IP networking stack & network technologies
  • Strong experience of full packet capture PCAP analysis and accompanying tools (Wireshark, netcat, hping, etc.)
  • Strong ability to automate manual processes and monitoring using general and purpose built scripting toolsets (PERL, Python, Powershell)
50

Cyber Threat Analyst, Mid Resume Examples & Samples

  • 4 years of experience with completing indicators of compromise (IOC) assessments of networks and producing related reports
  • Ability to provide IT helpdesk–style technical support for the software solution
  • Experience with the Department of Health and Human Services
51

Cyber Threat Analyst Resume Examples & Samples

  • Experience with performing Cyber assessments on operational networks
  • Knowledge of NASA mission-related networks and system architecture, including Space Communications and Navigation Networks, Orion Multipurpose Crew Vehicle, and International Space Station
  • Knowledge of Continuous Diagnostics and Mitigation (CDM) or CDM type activities
  • Knowledge of available Cyber tools used by the government or aerospace industry to monitor Cybersecurity or use to perform assessments
52

Cyber Threat Analyst Resume Examples & Samples

  • 3+ years of experience with network defense tools, including IPS, IDS, HBSS, Proxy, Firewall, ArcSight SIEM, Netflow, or Forensic Toolkit
  • 3+ years of experience with using and maintaining IP networks and common operating systems and applications, including Linux, Windows, or Microsoft Office products
  • Ability to discern the difference between normal events on a network and potential security events
  • Experience with writing IPS and IDS signatures in Tipping Point, SNORT, or HBSS HIPs
  • Knowledge of current computer network threats and trends and vulnerability scanning assessments
  • Knowledge of common ports and protocols
  • Ability to write technical whitepapers and Standard Operating Procedures, create presentations, and communicate the ideas and concepts being presented clearly
53

Cyber Threat Analyst Resume Examples & Samples

  • Ability to advise C2BMC Command Center (CCC) leadership to support execution of technical countermeasures, to include but not limited to CTO, TASKORDS, Warning Orders, and Situational Awareness Reports
  • Ability to advise others on the selection and application of CNO analytic methods and tools
  • Ability to research and develop solutions to emerging cyber threats
54

Cyber Threat Analyst Resume Examples & Samples

  • 5 Years with Bachelors in Science; 3 Years with Masters; 0 Years with Ph.D, or 9 years in lieu of a degree
  • DoD 8570 certification IAM - Level II (CCNA-Security, GICSP, GSEC, Security+ CE, SSCP)
  • The ability to advise others on the selection and application of CNO analytic methods and tools
  • The ability to research and develop solutions to emerging cyber threats
  • The ability to communicate complex information, concepts, or ideas in a confident and well-organized manner
  • The ability to provide technical and analytical expertise for investigation or validation of potential network and/or system anomalous behavior
  • Proficiency in Microsoft office tools to include: Word, PowerPoint, Project, Excel and Access; and familiarity with Visio
55

Cyber Threat Analyst Resume Examples & Samples

  • 6 years of experience as an All Source intelligence analyst supporting Cyber activities and operations in DoD or other United States Government organizations
  • Bachelor's degree in any field
  • 1 year of experience in each of the following: Intelligence Message Handling Systems (MHS), HUMINT online Tasking and reporting (HOTR), and Microsoft Office Suite
56

Cyber Threat Analyst, Senior Resume Examples & Samples

  • 5+ years of experience in a Cybersecurity related position, including SOC, threat analyst, malware analyst, or forensic examiner
  • Experience with using both Windows and UNIX operating systems
  • GIAC Network Forensic Analyst (GNFA), GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Handler (GCIH), or CISSP Certification
  • Experience with scripting or programming languages, including Bash scripting, Perl, and Python
  • Experience with digital forensics and malware analysis
  • Active Cyber Certifications, including GIAC Penetration Tester (GPEN), GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), GIAC Certified Forensic Examiner (GCFE), GIAC Certified Forensic Analyst (GCFA), GIAC Reverse Engineering Malware (GREM), or EnCase Certified Examiner (EnCE)
57

Cyber Threat Analyst Resume Examples & Samples

  • 2+ years of experience with SIGINT analysis and reporting
  • Experience with programming languages
  • Experience with supporting Defensive Cyber Operations (DCO) or Offensive Cyber Operations (OCO)
  • Experience with computer networking and telecommunication architecture, the OSI model, communications protocols, and common hacker TTPs
  • Experience with malware analysis or triage and computer network-based research, analysis, and intrusion detection systems
  • Knowledge of hacker methodology and malware analytic methods
  • Ability to analyze network intrusions to create network defense signatures and ID the difference between anomalous and malicious network activity
  • BA or BS degree or military equivalent
58

Cyber Threat Analyst Resume Examples & Samples

  • Triage, process, correlate, analyze, and disseminate CIC alerts, reports, and briefings based on evaluation of cyber threat data from both internal and external sources
  • Write with technical accuracy and analytic precision about tactics, techniques, and procedures (TTPs), relevant indicators of compromise (IOC), and threat actors’ capabilities, motivations for a technical and non-technical audiences
  • Conduct root cause analysis to identify opportunities to predict, prevent, and mitigate risk within the bank
  • Identify, evaluate, and pivot off incomplete or unreliable technical and non–technical evidence found on the open Internet to formulate reasoned assessments
  • Should possess a solid understanding of the cyber threat Kill Chain methodology to ascertain the impact of an attack and develop threat trends to assist the mitigation work centers and personnel in developing mitigation techniques and countermeasures which can prevent or lessen the effects of future cyber-attacks
  • Interact daily with the Citi CIC and Cyber Security Fusion Center staff members globally working in a supporting function for the CFC
  • Experience working in a fast-paced, customer-focused operational environment
  • 2+ years working in a cyber threat intelligence function
  • 2+ years of experience with collecting, analyzing, and interpreting qualitative and quantitative data, including indicators of compromise (IOC), from multiple sources for the purposes of documenting results and analyzing findings to provide meaningful products
  • Excellent oral and communication skills
  • Technical certifications or education is a plus (e.g., CEH, SANS coursework, Computer Forensics related, etc.)
59

Cyber Threat Analyst With Top Secret Clearance Resume Examples & Samples

  • Performs computer and/or network security threat assessments to identify, evaluate and mitigate security risks, and vulnerabilities
  • Provides communication and escalation to senior leadership and mission partners on completed intelligence efforts which will enable informed decision making
  • Perform detailed analysis of threats during the incident process, combining sound analytical skills with advanced knowledge of IT security and network threats
  • Analyze cyber threat data and correlate with existing understanding of customer environments
  • Maintains daily awareness of Threat Information/Intelligence germane to supported business operations through open source, government sector, and private sector intelligence sources
  • Collaborates with Vulnerability Assessors and Incident Handlers, develop and deliver Risk Assessment Briefings, dashboard products, security tools tuning as required
  • Prepares and deliver intelligence products for analysts, users, and mission partners on threat actors, TTPs, and vulnerabilities that hold client business practices at risk
  • Develop and implement an intelligence enabled Operational Security (OPSEC) Program to train the technical and non- technical user base on current threats and best practices to minimize risk to mission and personnel
  • Validates system security requirements definition and analysis
  • Establishes system security designs. Implements security designs in hardware, software, data, and procedures
  • Prepares intelligence assessments through intelligence gathering using multiple intelligence sources such as human intelligence (HUMINT), signals intelligence (SIGINT), geospatial intelligence (GEOINT), measurement and signal intelligence (MASINT), open source intelligence (OSINT) to support customers including military, intelligence, law enforcement or security agencies
  • Analyzes current intelligence holdings, identifies potential shortfalls, gaps and vulnerabilities to develop subsequent collection requirements
  • Develops periodic and special intelligence reports, plans and briefings. Recommends changes, and where appropriate, courses of action
  • Augment the security operations team with 24/7 intelligence support and planning, as required, to maintain a high level of mission readiness and network availability
  • Bachelor's degree in international relations, political science, intelligence studies, psychology or related field preferred or 8+ years of intelligence experience, or equivalent combination of education and experience
  • Graduate of an intelligence training school or equivalent
  • Experience working with specialized specific intelligence sources such as human intelligence (HUMINT), signals intelligence (SIGINT), geospatial intelligence (GEOINT), measurement and signal intelligence (MASINT), open source intelligence (OSINT); preferred level of expertise that includes section or team lead of intelligence missions
  • Experience working with multiple intelligence sources, databases, and content management
  • Interpersonal skills to interact with a wide variety of experienced customers and team members
  • Ability to work with intelligence databases and related tools
  • Ability to perform in a team environment and a strong desire to learn
  • Active interest in cyber security, incident detection, network and systems security
  • Familiarity with cyber-crime and cyber-attacks, responsible groups, motivations and techniques
  • Experience/exposure to IT service management best practices (ITIL)
  • DoD 8570 standards (A+, Net+, Sec+)
  • CISSP, CEH, GCIH certifications
  • SIEM exposure (Splunk preferred)
60

Cyber Threat Analyst Resume Examples & Samples

  • Help Webster's security engineering team develop new technology solutions to support SOC needs
  • Help develop and deliver security awareness training and user education throughout Webster
  • Work with Webster's information security architect to design security services and recommend security architecture improvements
  • Network communications, infrastructure, protocols, and traffic analysis
  • Windows and/or Unix Administration
  • Virtualization technologies
  • Security engineering including secure system design and security best practices
  • Malware analysis and reverse Engineering
  • Digital forensics
  • Cyber threat intelligence
  • Vulnerability assessment and red teaming
61

Cyber Threat Analyst Resume Examples & Samples

  • 2+ years of experience in a Cybersecurity role, including threat analyst, malware analyst, or forensic examiner
  • Knowledge of basic internet protocols, including TCP/IP
  • Ability to analyze network traffic data for anomalous or malicious content with tools, including Wireshark, NetworkMiner, Dshell, tcpdump, and tshark
  • Ability to think and work independently with minimal supervision
  • Ability to reverse engineer network or malware communication protocols allowing for identification of infrastructure, functionality, transport methods, and decoding of control processes
  • Active Cyber Certification, including GIAC Penetration Tester (GPEN), GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), GIAC Certified Forensic Examiner (GCFE), GIAC Certified Forensic Analyst (GCFA), GIAC Reverse Engineering Malware (GREM), or EnCase Certified Examiner (EnCE)
62

Cyber Threat Analyst Resume Examples & Samples

  • Knowledge of computer systems and cyber terminology
  • Experience working in Joint and/or Combined commands preferred
  • Experience leveraging intelligence data mining tools (i.e. M3, TAX, etc.)
63

Junior Cyber Threat Analyst Resume Examples & Samples

  • Bachelor's Degree in InfoSec, Computer Science, or a related discipline
  • 0-2 years of experience in an Information Security role
  • Solid understanding of information security and networking concepts, such as firewalls, patch management, vulnerability scanning, packet sniffers, intrusion prevention, and SIEM
  • Relevant experience with intrusion detection systems and firewalls
  • Experience collecting data from multiple sources and consolidating results into analytic models, alerts, and reports
  • Strong analytical, written, and verbal communication skills are required
64

Cyber Threat Analyst Resume Examples & Samples

  • 3+ years of experience with collecting, analyzing, and interpreting qualitative and quantitative data from multiple sources for the purposes of documenting results and analyzing findings to provide meaningful products
  • Ability to develop IDS/IPS signatures and optimize those developed by others
  • Ability to develop expertise in discerning patterns of complex threat actor behavior and communicate comprehension of current and developing Cyber threats
  • Experience with Cybersecurity analysis and incident response in a large organization
  • Experience with Enterprise Security Managers, including SEIM or ESM, such as Splunk or ArcSight
  • Possession of excellent oral and written communication skills for use in a professional consulting environment
65

Cyber Threat Analyst Resume Examples & Samples

  • A Bachelor’s Degree in a related technical field and a minimum of 5 years related technical experience required
  • Selected candidate must be able to support shift work
  • Minimum of 5 years Threat Analysis experience required
  • Active EOD
  • Previous experience providing on-site consulting support for a technical project, preferably with a federal customer
66

Cyber Threat Analyst Resume Examples & Samples

  • Bachelor’s Degree and a minimum of 9 years’ experience required
  • Previous work experience in cyber threat analytics
  • Experience working in cyber intelligence requiring, at minimum, a moderate technical acumen
67

Cyber Threat Analyst Resume Examples & Samples

  • Demonstrated experience relating to the position description
  • Ability to perform proactive cybersecurity operations using the analysis of threat/intelligence based products
  • Research raw data and provide complex cyber threat analysis to ensure awareness of current and evolving cyber threats
  • Experienced understanding of cyber adversaries and their MO/TTP
  • Knowledge of vulnerabilities and exploits and the capability to provide mitigation strategies
  • Excellent verbal and written communication skills, to include proven track record in briefing high-ranking U.S. Government officials
  • Experience with a variety of intelligence tools and databases
68

Senior Cyber Threat Analyst Resume Examples & Samples

  • BA/BS degree in Information Technology or Information Security, Computer Science, Intelligence Studies, Cyber Security or another related field of study or equivalent 8+ years performing technical cyber threat ntelligence analysis
  • Formal training as an intelligence analyst in any discipline ? graduate of US Govt intelligence analysis course: CAC, IBC, Kent School, IC 101, Analysis 101, Army, Navy, Air Force, etc
  • Advanced Data Visualization proficiency leveraging COTS/GOTS tools
  • Technical Skills proficiency: Python language, encryption technologies/standards
  • Intermediate malware analysis or digital computer forensics experience
69

Cyber Threat Analyst Resume Examples & Samples

  • Serves as a primary member of the Cyber Threat Center (CTC) who handles security events and incidents on a daily basis in a fast-paced environment
  • Acts as an Incident Handler who can handle minor and major security incidents within the defined Computer Security Incident Response process
  • Role embodies Cyber Network Defense and a successful Cyber Threat Analyst will be able to quickly analyze threats, understand risk, deploy effective countermeasures, make business critical incident response decisions, and work as part of a team of individuals dedicated to protecting the firm
  • B.S. in Computer Science, Computer Engineering, MIS, or related degree and a minimum of three (3) years of related experience in Information Security or an equivalent combination of education, training and experience. Experience should include a minimum of two (2) years in conducting Cyber Network Defense and a minimum of three (3) years of experience with incident response methodologies, malware analysis, penetration testing, scripting and/or forensics
  • Systems administrator experience in Linux, Unix, Windows or OSX operating systems
  • Knowledge of networking and the common network protocols
  • Demonstrated ability to create complex scripts, develop tools, or automate processes in PowerShell, Python or Bash
  • One or more of the following certifications or the ability to obtain within 1 year
70

Advance Cyber Threat Analyst Resume Examples & Samples

  • Performs advanced analysis of adversary tradecraft, malicious code, and capabilities. Provides cyber threat and
  • Cyber Security Policy and advanced cyber security threat mitigation at the Expert Level
  • Advanced Cyber security tools, network topologies, intrusion detection, PKI, and secured networks
  • Implementation of cyber security regulations
  • Tracking all activity, insuring timely resolution of problems
  • Coordinating the development of advanced security signature or access control mechanisms that can be implemented on security systems such as intrusion prevention - detection systems, firewalls, routers or endpoint in response to new or observed threats within the enterprise
  • Leading the identification of advanced security systems and controls to ensure the monitoring and configuring of security appliances
  • Ensuring that Analysts receive and analyze alerts from various enterprise level sensors and determine possible causes of such alerts
  • Performing advanced analysis of adversary tradecraft, malicious code, and capabilities
  • Creating and leading processes that support the analysis of log files from a variety of enterprise level systems and sensors to include individual host logs, network traffic logs, firewall logs, and intrusion detection/prevention system logs
  • Identifying anomalous activity and potential threats to enterprise resources
  • Monitoring external and internal data sources in order to maintain enterprise threat conditions
  • Leading the processes which support event correlation by using information gathered from a variety of system and sensor sources within the enterprise
  • Managing the collection and advanced analysis of intrusion artifacts and using discovered data to enable mitigation potential of incidents within the enterprise
71

Cyber Threat Analyst Resume Examples & Samples

  • Bachelor’s degree in computer science, electronics engineering or other engineering or technical discipline is
  • At least 10 years of experience in similar role; 8 years of additional relevant experience can be substituted for education
  • Must possess at least one of the following certifications
  • GIAC Systems and Network Auditor (GSNA)
  • CERT - Certified Computer Security Incident Handler (CSIH)
  • SPLUNK Certified Knowledge Manager
  • SPLUNK Certified Admin
72

Cyber Threat Analyst Resume Examples & Samples

  • Bachelor’s degree in computer science,
  • At least 10 years of experience in similar role
  • 8 years of additional relevant experience can be substituted for education
  • Must be certified in Certified Cyber Intelligence
73

Senior Cyber Threat Analyst Resume Examples & Samples

  • Provide threat context and integration support to multiple FireEye service lines
  • Maintain expert knowledge of advanced persistent threats tools, techniques, and procedures (TTPs) as well as forensics and incident response practices
  • Analyze technical data to extract attacker TTPs, identify unique attributes of malware, map attacker infrastructure, and pivot to related threat data
  • Identify and hunt for emerging threat activity across all internal/external sources
  • Establish standards, taxonomy, and processes for threat modeling and integration
  • Provide threat research and context to global service delivery for Mandiant and FireEye-as-a-Service investigations
  • Drive FireEye detections and technology through threat expertise and knowledge
  • Perform threat research and analysis during high-severity cyber-attacks impacting FireEye customers globally
  • Cross-coordinate threat data and trends between GSI internal teams for rapid inclusion into customer deliverables
  • Excellent communication and presentation skills with the ability to exchange information with technical and non-technical audiences
  • Exceptional written communication skills
  • Strong leadership skills with the ability to prioritize and execute
  • Ability to set and manage expectations with senior stakeholders and team members
  • Strong problem solving, troubleshooting, and analysis skills
  • Experience working in fast-paced development environments
  • Self-driven, proactive, hardworking, creative team-player with a good sense of humor
74

Cyber Threat Analyst With Top Secret Clearance Resume Examples & Samples

  • Coordinate with members of intrusion analysis, incident response, vulnerability assessment, external assessment, and cyber threat analysis teams to expand the capabilities of the organization Provides communication and escalation to senior leadership and mission partners on completed intelligence efforts which will enable informed decision making
  • Perform detailed analysis of threats during the incident process, combining sound analytical skills with advanced knowledge of IT security and network threats - Analyze cyber threat data and correlate with existing understanding of customer environments
  • Reviewing weekly, monthly and on demand threat intelligence reports - Establishes and maintain open lines of communication with a wide range of data asset owners throughout the Intelligence Community (IC)