• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
      • Identity theft
    • Malware
      • Ransomware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
AskCyber Home » News » Jobs » Cyber Threat Intelligence Analyst – FireEye

Cyber Threat Intelligence Analyst – FireEye

2020-06-15 by Geo

Company Location: Wilmington, DE, US

Industry: Computer Networking Computer & Network Security Computer Software

Employment Type: Full-time

Company Description

FireEye is the leader in intelligence-led security-as-a-service. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,000 customers across 67 countries, including more than 45 percent of the Forbes Global 2000.

Job Description

FireEye is seeking a Cyber Threat Intelligence Analyst in Wilmington, Delaware. If you have a strong background in analysis and are looking to be at the forefront of the cyber threat intelligence field, then we want to hear from you! The successful candidate should be a self-motivated and independent, critical thinker skilled in the application of threat intelligence for the enablement of a customer’s network security. The analyst will address a customer’s threat intelligence needs and leverage FireEye’s unique knowledge to produce informative products, briefs, and other means of supporting the organization.

SALE! Get $430 off 17″ Legion Y740 Laptop 81UG0000US with Intel i7, 16GB Memory, 1TB + 256GB SSD, now $1,279.99!

Responsibilities

  • Work with customers to determine their intelligence needs and requirements, and identify the most effective methods for fulfilling these unique requirements
  • Conduct extensive research into current threat activity to determine customer-relevant threat intelligence
  • Produce briefing material, written products, and simple graphics in order to convey analysis both verbally and in writing to a variety of audiences
  • Present tactical, operational, and strategic intelligence about threat groups, the methodologies they use, and the motivations behind their activity
  • Correlate threat intelligence from the customer’s industry/region to observed activity impacting the customer
  • Evaluate current and emerging tools and best-practices for tracking advanced persistent threats; tools, techniques, and procedures (TTPs) of attacker’s motivations, industry and attacker trends
  • Ability to work with minimal direct oversight, maintaining high quality analytical production and excellent customer relationship

Qualifications

  • 2 + years of experience in an analytical role of either network forensics analyst, intelligence threat analyst, or security engineer/ consultant
  • 2 + years of experience in investigative or incident response environments
  • 2 + years working in a customer-facing environment
  • Strong understanding of cyber crime threats and the cyber criminal ecosystem as well as targeting of the financial sector
  • Exceptional oral and written communication skills
  • Excellent communication and presentation skills with the ability to present to a variety of internal audiences including senior leadership
  • Excellent organizational skills with the ability to prioritize and execute in a disciplined manner
  • Outstanding communication and interpersonal abilities, with the ability to adapt to a variety of customer personalities
  • Ability to set and manage expectations with senior stake-holders and team members
  • Demonstrated ability to manage customer relationships

See Our Cyber Security Career Center for Training and Jobs

Technical Qualifications

  • Experience in evaluating forensic reports of electronic media, packet capture, log data, and network devices in support of intrusion analysis or enterprise level information security operations
  • Experience working with threat modeling systems
  • Broad understanding of network architecture and network security methods (web content filtering, domain reputation policy, snort signatures, host-based analysis systems (HBSS, HX), email analysis)
  • Ability to interact with their user interfaces
  • Experience with basic malware analysis; the tactics, tools, techniques, and procedures of network intrusion activity
  • Experience analyzing malicious office files, pdf and jar files, reviewing automated sandbox reports, and reviewing network traffic captures

Additional Qualifications

  • Bachelor’s or other professional degree preferred
  • Malware/security experience and experience with FireEye products, highly desired
  • Possesses subject matter expertise on several different eCrime malware families, how they have been historically distributed and the maturation of those families over time
  • Understanding of monetization and fraud tactics used by cyber threat actors
LinkedIn Apply
APPLY HERE

Additional Information

At FireEye we are committed to our #OneTeam approach combining diversity, collaboration, and excellence. All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability. Requests for accommodation due to disability can be sent directly to [email protected].

Filed Under: Jobs

About Geo

Geo Dvorak has experience in the privacy space, with a focus on highlighting the growing market for privacy professionals. He joined the Ask Cyber team to handle the jobs board.


Twitter

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

511 Tactical

WHAT TO SHOP NOW

Shop

Safeguard Your Money with a VPN

Beat the Stock Market! - Get Rule Breakers!

Malwarebytes Anti-Virus is On Sale!

Shop Kaspersky Anti-Virus

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

President Biden’s Pelton: Saturday Sitrep

Adult Video Streaming Site Data Breach Exposes 2M Customers

Fake eBay Notification Scam Steals Big Money

Principal Security Consultant – AWS

NJCCIC Announces Alice in Cyberspace 2021

Categories

Cyber Security News

Fake eBay Notification Scam Steals Big Money

… [Read More...] about Fake eBay Notification Scam Steals Big Money

NJCCIC Announces Alice in Cyberspace 2021

… [Read More...] about NJCCIC Announces Alice in Cyberspace 2021

PayPal Phishing Scam Steals Accounts

… [Read More...] about PayPal Phishing Scam Steals Accounts

Gun Forum Booted by Domain Registrar

… [Read More...] about Gun Forum Booted by Domain Registrar

More Cyber Security News

Tags

amazon Android Apple bitcoin Career China chrome CISA credit card Cyber Attack Cyber security Data Breach data privacy DHS Equifax Facebook FBI Firefox FTC games GDPR Google Government hack hacker identity theft iPhone Iran IRS malware Microsoft North Korea PayPal phishing phishing email ransomware Russia scam smartphone TikTok tutorial VPN web browser WhatsApp WiFi

Government

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

Texas DOT Hit by Ransomware Attack

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • News
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2021 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version