
Company Location: Bloomfield, CT
Seniority Level: Associate
Industry
- Human Resources
- Insurance
- Financial Services
Employment Type: Full-time
Job Functions
- Other
- Information Technology
- Management
As a member of the Cyber Security Global Threat Management team, the Threat Intelligence and Analysis Information Protection Lead Analyst processes both internal and external Cyber Threat Vulnerability Intelligence for determination of impact, assessment of scope, and implementation of mitigations to defend Cigna’s enterprise through proactive research. They will support the curation and production of threat intelligence and provide critical support for the Vulnerability Management, Threat Hunting, Cyber Security Operations and Incident Response services globally for Cigna.
- Conduct analysis on Vulnerability Intelligence to identify impacted assets or applications
- Ability to translate intelligence analysis into written or verbal communications to share with senior management information systems professionals, and technical and non-technical users
- Knowledge of security systems and understands the life cycle of network threats, attacks, attack vectors, and methods of exploitation; conduct trending and correlation of cyber intelligence for the purposes of attribution and establish strategic countermeasures
- Identify threats, trends and new developments in exploits and exploit behavior by adversaries by analyzing raw intelligence and data
- Able to provide recommendations of security improvements by assessing current efficacy of current capabilities/solutions, evaluating trends and anticipating requirements
- Fundamental understanding of vulnerabilities, what causes them, how an attacker could leverage them to perform malicious activities and what organizations can do to mitigate them
Skills
- Ability to quickly and effectively digest disparate data sources to determine security implications and risk levels
- Able to provide recommendations of security improvements by assessing current efficacy of current capabilities/solutions, evaluating trends and anticipating requirements
- Strong analytical skills and ability to creatively challenge current methods and procedures
- Develop, create, and drive current and new reporting methods of Intelligence analysis to peers and leadership teams for purposes of situational awareness and ensuring Intelligence products are actionable
- Assess identified vulnerabilities to understand their impact and potential mitigation
- Conduct trending and correlation of cyber intelligence for the purposes of attribution and establish strategic countermeasures
- Knowledge of virtual environments, Cloud platforms (IaaS), network operating systems, mobile device environments, and data encryption methods
- Knowledge of networking protocols and infrastructure designs; including routing, firewall functionality, host and network intrusion detection systems, encryption, load balancing, and other network protocols
- Advanced knowledge of log analysis, traffic flow analysis and experience with associated infrastructure and systems to aid in the identification of malware or other malicious behavior
- Strong knowledge of a broad array of security tools including Security Information and Event Management (SIEM) system, intrusion detection systems, web proxy systems, threat intelligence platforms and other tools used to assess network security
- Strong knowledge of the technical details involved in current APT threats and exploits involving various operating systems, applications and networking protocols
- Construct and exploit threat intelligence to detect, respond, and defeat threats
- Manage, share, and receive intelligence on adversary groups
- Leverage intelligence to better defend against and respond to future intrusions
- Demonstrated ability to work in a team environment both in-person and remotely
- Excellent written and verbal communication skills, analytical ability, and the ability to work effectively with peers, IT management and senior leaders
- Must be able to multi-task and work independently on assignments using professional discretion and judgment as well as transition quickly between projects with limited supervision
- Ability to participate in customer and partner facing meetings and projects, including those that involve technical topics or technical service delivery
- Must be able to work well under pressure while maintaining a professional image and approach
- Maintain partnership and memberships to coordinate with appropriate sources within the intelligence community regarding possible security incidents
Get Training!
- Introduction to Cybersecurity Tools & Cyber Attacks by IBM
- Financial Markets by Yale University
- International Cyber Conflicts from the State University of New York
- Business Foundations by University of Pennsylvania
- (sponsored)
Education
- Bachelor’s degree and 2 years of experience in information technology OR 5+ years of Cyber Security focused experience or related IT experience preferred