• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
AskCyber Home » News » Jobs » Cyber Threat Intelligence Analyst – FireEye

Cyber Threat Intelligence Analyst – FireEye

2020-06-15 by Geo

Company Location: Wilmington, DE, US

Industry: Computer Networking Computer & Network Security Computer Software

Employment Type: Full-time

Company Description

FireEye is the leader in intelligence-led security-as-a-service. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,000 customers across 67 countries, including more than 45 percent of the Forbes Global 2000.

Job Description

FireEye is seeking a Cyber Threat Intelligence Analyst in Wilmington, Delaware. If you have a strong background in analysis and are looking to be at the forefront of the cyber threat intelligence field, then we want to hear from you! The successful candidate should be a self-motivated and independent, critical thinker skilled in the application of threat intelligence for the enablement of a customer’s network security. The analyst will address a customer’s threat intelligence needs and leverage FireEye’s unique knowledge to produce informative products, briefs, and other means of supporting the organization.

SALE! Get $430 off 17″ Legion Y740 Laptop 81UG0000US with Intel i7, 16GB Memory, 1TB + 256GB SSD, now $1,279.99!

Responsibilities

  • Work with customers to determine their intelligence needs and requirements, and identify the most effective methods for fulfilling these unique requirements
  • Conduct extensive research into current threat activity to determine customer-relevant threat intelligence
  • Produce briefing material, written products, and simple graphics in order to convey analysis both verbally and in writing to a variety of audiences
  • Present tactical, operational, and strategic intelligence about threat groups, the methodologies they use, and the motivations behind their activity
  • Correlate threat intelligence from the customer’s industry/region to observed activity impacting the customer
  • Evaluate current and emerging tools and best-practices for tracking advanced persistent threats; tools, techniques, and procedures (TTPs) of attacker’s motivations, industry and attacker trends
  • Ability to work with minimal direct oversight, maintaining high quality analytical production and excellent customer relationship

Qualifications

  • 2 + years of experience in an analytical role of either network forensics analyst, intelligence threat analyst, or security engineer/ consultant
  • 2 + years of experience in investigative or incident response environments
  • 2 + years working in a customer-facing environment
  • Strong understanding of cyber crime threats and the cyber criminal ecosystem as well as targeting of the financial sector
  • Exceptional oral and written communication skills
  • Excellent communication and presentation skills with the ability to present to a variety of internal audiences including senior leadership
  • Excellent organizational skills with the ability to prioritize and execute in a disciplined manner
  • Outstanding communication and interpersonal abilities, with the ability to adapt to a variety of customer personalities
  • Ability to set and manage expectations with senior stake-holders and team members
  • Demonstrated ability to manage customer relationships

See Our Cyber Security Career Center for Training and Jobs

Technical Qualifications

  • Experience in evaluating forensic reports of electronic media, packet capture, log data, and network devices in support of intrusion analysis or enterprise level information security operations
  • Experience working with threat modeling systems
  • Broad understanding of network architecture and network security methods (web content filtering, domain reputation policy, snort signatures, host-based analysis systems (HBSS, HX), email analysis)
  • Ability to interact with their user interfaces
  • Experience with basic malware analysis; the tactics, tools, techniques, and procedures of network intrusion activity
  • Experience analyzing malicious office files, pdf and jar files, reviewing automated sandbox reports, and reviewing network traffic captures

Additional Qualifications

  • Bachelor’s or other professional degree preferred
  • Malware/security experience and experience with FireEye products, highly desired
  • Possesses subject matter expertise on several different eCrime malware families, how they have been historically distributed and the maturation of those families over time
  • Understanding of monetization and fraud tactics used by cyber threat actors
LinkedIn Apply
APPLY HERE

Additional Information

At FireEye we are committed to our #OneTeam approach combining diversity, collaboration, and excellence. All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability. Requests for accommodation due to disability can be sent directly to [email protected].

Filed Under: Jobs

About Geo

Geo Dvorak has experience in the privacy space, with a focus on highlighting the growing market for privacy professionals. He joined the Ask Cyber team to handle the jobs board.


Twitter

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version