Logo
Phase2 Technology

Cyber Threat Intelligence Analyst, Mid

Phase2 Technology, Arlington, Virginia, United States, 22201

Save Job

Job Number: R0231680

Cyber Threat Intelligence Analyst, Mid The Opportunity As a cyber threat intelligence analyst, you know the key to detecting and deterring malicious activity is quality risk‑based intel that maps to a tactical behavior. At Booz Allen, you can apply your expertise to investigate the most pressing cyber threats impacting our nation's critical infrastructure. This is your chance to help a team as they take on the adversary's perspective, identify their motivations, and recommend ways to harden systems, reduce their attack surface, and thwart malicious actors.

As a Cyber Threat Intelligence Analyst on our team, you'll oversee the collection, documentation, assessment, and analysis of raw cyber threat information using tools and technologies like MISP, ThreatQ, FireEye, LookingGlass, MITRE Attack Framework, Linux, UNIX, and tcpdump, to enrich intelligence. You will conduct strategic assessments on systems and networks and provide tactical analyses and influential recommendations for network operation. You'll be the key to discovering and correlating timely threat intel and deciphering what represents a real risk, and you'll play a lead role in incident analysis, adversarial research, and finished intelligence products to inform policymakers, cyber operators, and mission area leadership.

Cyber threats are evolving. Booz Allen is committed to creating an environment where you not only keep pace with the industry, but propel it forward. With access to academic programs, certifications, and opportunities to use expert tradecraft, we'll continuously invest in you so you can create the career you want as you grow.

Join us. The world can't wait. You Have:

Experience with intelligence analysis principles and cyber threat intelligence principles

Experience in a consulting environment, communicating technical subjects to clients

Knowledge of information security and IT threats, attacks, and vulnerabilities

Knowledge of cybersecurity concepts

Ability to work independently with minimal supervision

TS/SCI clearance

HS diploma or GED and 10+ years of experience with cybersecurity, Bachelor's degree and 6+ years of experience with cybersecurity, or Master's degree and 4+ years of experience with cybersecurity

Nice If You Have:

Experience with computer network protocols and operations

Experience with the IC and its products, procedures, and computer networks

Knowledge of Advanced Persistent Threats

Knowledge of analytic threat models, including ATT&CK, Pyramid of Pain, and Diamond Model

Ability to perform queries on indicators and characteristics, including Message‑Digest Algorithm 5, Secure Hash Algorithm 1, IP Addresses, file size, file name, and file paths

#J-18808-Ljbffr