
Company Location: Wilmington, DE, US
Industry: Computer Networking Computer & Network Security Computer Software
Employment Type: Full-time
Company Description
FireEye is the leader in intelligence-led security-as-a-service. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,000 customers across 67 countries, including more than 45 percent of the Forbes Global 2000.
Job Description
FireEye is seeking a Cyber Threat Intelligence Analyst in Wilmington, Delaware. If you have a strong background in analysis and are looking to be at the forefront of the cyber threat intelligence field, then we want to hear from you! The successful candidate should be a self-motivated and independent, critical thinker skilled in the application of threat intelligence for the enablement of a customer’s network security. The analyst will address a customer’s threat intelligence needs and leverage FireEye’s unique knowledge to produce informative products, briefs, and other means of supporting the organization.
Responsibilities
- Work with customers to determine their intelligence needs and requirements, and identify the most effective methods for fulfilling these unique requirements
- Conduct extensive research into current threat activity to determine customer-relevant threat intelligence
- Produce briefing material, written products, and simple graphics in order to convey analysis both verbally and in writing to a variety of audiences
- Present tactical, operational, and strategic intelligence about threat groups, the methodologies they use, and the motivations behind their activity
- Correlate threat intelligence from the customer’s industry/region to observed activity impacting the customer
- Evaluate current and emerging tools and best-practices for tracking advanced persistent threats; tools, techniques, and procedures (TTPs) of attacker’s motivations, industry and attacker trends
- Ability to work with minimal direct oversight, maintaining high quality analytical production and excellent customer relationship
Qualifications
- 2 + years of experience in an analytical role of either network forensics analyst, intelligence threat analyst, or security engineer/ consultant
- 2 + years of experience in investigative or incident response environments
- 2 + years working in a customer-facing environment
- Strong understanding of cyber crime threats and the cyber criminal ecosystem as well as targeting of the financial sector
- Exceptional oral and written communication skills
- Excellent communication and presentation skills with the ability to present to a variety of internal audiences including senior leadership
- Excellent organizational skills with the ability to prioritize and execute in a disciplined manner
- Outstanding communication and interpersonal abilities, with the ability to adapt to a variety of customer personalities
- Ability to set and manage expectations with senior stake-holders and team members
- Demonstrated ability to manage customer relationships
See Our Cyber Security Career Center for Training and Jobs
Technical Qualifications
- Experience in evaluating forensic reports of electronic media, packet capture, log data, and network devices in support of intrusion analysis or enterprise level information security operations
- Experience working with threat modeling systems
- Broad understanding of network architecture and network security methods (web content filtering, domain reputation policy, snort signatures, host-based analysis systems (HBSS, HX), email analysis)
- Ability to interact with their user interfaces
- Experience with basic malware analysis; the tactics, tools, techniques, and procedures of network intrusion activity
- Experience analyzing malicious office files, pdf and jar files, reviewing automated sandbox reports, and reviewing network traffic captures
Additional Qualifications
- Bachelor’s or other professional degree preferred
- Malware/security experience and experience with FireEye products, highly desired
- Possesses subject matter expertise on several different eCrime malware families, how they have been historically distributed and the maturation of those families over time
- Understanding of monetization and fraud tactics used by cyber threat actors
Additional Information
At FireEye we are committed to our #OneTeam approach combining diversity, collaboration, and excellence. All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability. Requests for accommodation due to disability can be sent directly to [email protected].