Cyber Threat Intelligence Analyst

American International Group Reston , VA 20190

Posted 2 months ago

Functional Area:

IT - Information Technology

Estimated Travel Percentage (%): Up to 25%

Relocation Provided: Yes

AIG Employee Services, Inc.

The gCDC is AIG's world-class cybersecurity operations center. Our team is made up of cybersecurity professionals from both the public and private sectors with first-hand experience preventing and remediating high-profile cyber threats. The gCDC works to reduce cyber risk and keep safe AIG's information and data assets by:

  • Rapidly detecting, responding to, and containing security incidents;

  • Communicating cyber threat intelligence to relevant stakeholders;

  • Analyzing incident metrics;

  • Identifying at-risk data; and

  • Supporting the notification of compromised data.

Position Responsibilities:

  • 60% data management, 40% cyber threat intelligence analysis

  • Analyze performance metrics and recommend organizational and process changes to improve efficiency of the Security Operations Center (SOC)

  • Directly support the gCDC Data Analytics & Reporting manager in the development, enhancement and maintenance of AIG cyber threat incident datasets for multiple geographies and business lines

  • Communicate threat intelligence information to business executives by understanding technical detail, and translating to reflect business impact

  • Brief AIG business leaders on cyber threat intelligence data affecting the firm, and the industry more broadly.

  • Directly support development, production, and dissemination of finished intelligence related to threats, policy analysis, and industry trends

Core Competencies:

  • Evaluate datasets and final metrics reports for consistency, completeness and statistical accuracy.

  • Communicate clearlyin written and oral formwith peers, partners, and business leaders.

  • Interact with customers and other teams to obtain data requirements for new and existing applications.

  • Audit data on a regular basis and ensure data integrity.

  • Manage a regular report running schedule and process.

  • Maintain process improvements for data management activities.

  • Perform data analysis using statistical tools.

  • Generate data reports on periodic basis for business leaders.

  • Identify and correct data entry errors.

  • Address any issues, questions and problems in accurate and timely manner.

  • Create a database for storing data dictionaries and troubleshooting problems.

Experience:

Minimum of three (3) years of experience with security monitoring, event and anomaly analysis, and incident response or malware analysis.

Formal Education & Certification

  • Bachelor of Science in Computer Science, Information Systems, or Software Engineering preferred, or relevant military, intelligence, or law enforcement experience.

  • Preferred Certifications: GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Handler (GCIH)

NOTE: An equivalent combination of experience, education and/or training may be substituted for the listed minimum requirements.

WORKING CONDITIONS

Occasional travel may be required, but less than 10% of the time. Analyst will be required to be on call.

It has been and will continue to be the policy of American International Group, Inc., its subsidiaries and affiliates to be an Equal Opportunity Employer. We provide equal opportunity to all qualified individuals regardless of race, color, religion, age, gender, gender expression, national origin, veteran status, disability or any other legally protected categories.

At AIG, we believe that diversity and inclusion are critical to our future and our mission creating a foundation for a creative workplace that leads to innovation, growth, and profitability. Through a wide variety of programs and initiatives, we invest in each employee, seeking to ensure that our people are not only respected as individuals, but also truly valued for their unique perspectives.


See if you are a match!

See how well your resume matches up to this job - upload your resume now.

Find your dream job anywhere
with the LiveCareer app.
Download the
LiveCareer app and find
your dream job anywhere
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Principal Cyber Threat Intelligence Analyst CyberPhysical/ ICS Team

Fireeye

Posted Yesterday

VIEW JOBS 11/20/2018 12:00:00 AM 2019-02-18T00:00 Position Title: Principal Cyber Threat Intelligence Analyst - Cyber-Physical/ ICS Team Location: Reston, VA The Company: FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 6,300 customers across 67 countries, including more than 40 percent of the Forbes Global 2000. The Role: The Cyber-Physical Intelligence Team is responsible for meeting intelligence needs of intelligence consumers across a wide range of government and industrial organziations. Well suited candidates will have demonstrated ICS security expertise and an interest in driving innovation in ICS threat intelligence. The requirements for this position are intentionally open-ended to draw applicants that have a wide range of traditional and unorthodox backgrounds in ICS security. Responsibilities: * Write analytic papers based on conclusions and judgements derived from large quantities of FireEye data sources and independent research * Provide ICS security subject matter expertise for the Cyber-Physical Intelligence Team * Inform and shape analytical projects * Answer questions of analysts and customers * Deliver briefs to customers and at conferences * Help drive innovation in how FireEye produces and delivers actionable ICS threat intelligence to customers * Stay abreast of new developments pertaining to the ICS and cyber-physical threat environment * Investigate leads for new insights about threat actors and their capabilities * Propose and conduct research projects that align to intelligence consumer requirements * Work independently and collaborate throughout the FireEye organization to develop and coordinate the production of intelligence Requirements: * B.S. or B.A. in Computer Science or Software Engineering (or comparable work experience) * Intimately acquainted with ICS components and protocols * Experience across multiple infrastructure verticals * Ability to express complex technical and non-technical concepts verbally, graphically, and in writing. Excellent writing skills are mandatory. Must be able to complete a writing sample during the interview process * Strong interpersonal and communications skills with a customer-oriented attitude * Strong comprehension of the technical underpinnings of cybersecurity * Ability to participate and provide input during crisis situations * Self-starter with great personal initiative In addition to these core skills, an ideal candidate will have 5+ years of experience focusing on ICS security in at least one of the following types of organizations: * Research and education institutions/ labs * Standardization and regulation bodies (government, private sector) * Security companies * Services (consulting, assessment, pentest, vulnerability/intelligence analysis) * Products/ solutions * Technical writing * Vendors and industrial organizations (utilities, production plants, etc.) * Military Additional Qualifications: * Programming / scripting skills * Foreign language skills in Russian, Chinese, Arabic, Farsi, and / or major European languages * Able to prioritize requests based on corporate goals All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability. Video: Fireeye Reston VA

Cyber Threat Intelligence Analyst

American International Group