Senior Cyber Threat Intelligence Analyst

Verizon Communications Alpharetta , GA 30023

Posted 2 weeks ago

What you'll be doing...

The Product Security team within Verizon's Corporate Information Security (CIS) organization works to embed security seamlessly into the development lifecycle of technology systems and services.

The Senior Threat Intelligence analyst will play a critical role in protecting Verizon's business and consumer products and services, from current and future cyber threats. This position involves technical research and intelligence analysis of threats relevant to our industry, business, product portfolio and related technologies. The ideal candidate will be aware of industry trends and frameworks and how they could impact our business, including threat actor groups, their TTPs, intrusion activities, and geopolitical relevance.

  • Research, analyze and triage Threat Intelligence feeds to identify impacted assets, or applications and create actionable results for internal stakeholders

  • Develop threat reports for technical and executive stakeholders across business and Information Security teams

  • Provide situational awareness on the current threat landscape and the TTPs associated with specific threats to our business

  • Assess emerging threats against our operational environment and collaborate with our security team partners for rapid mitigation and/or remediation

  • Conduct trending and correlation of cyber intelligence for the purposes of attribution and establish strategic countermeasures

  • Collaborate with the Intelligence Team that defends Verizon enterprise systems

  • Support and engage in incident response investigations & threat hunting missions and monitor third-party component threats & vulnerabilities.

  • Research vulnerabilities and provide threat assessments to influence patching remediation. Mitigate and resolve incidents based on defined procedures

  • Conduct advanced security event detection and threat analysis for complex and/or escalated security events.

  • Conduct application, system, network, malware, device analysis and make recommendations for remediation of security vulnerabilities.

  • Assist in the development of policy and procedures for cyber defense activities during daily operations and incident response situations.

  • Coordinate throughout the Verizon business to ensure common tools and techniques are properly utilized for cyber defense and cyber threat intelligence.

  • Respond to customer and community reported security issues and promote an environment of collaboration and individual accountability.

What we're looking for...

You'll need to have:

  • Bachelor's degree or four or more years of work experience.

  • Six or more years of relevant work experience.

  • Experience in Threat Intelligence including hands-on experience with various cybersecurity technologies, standards and frameworks (MITRE ATT&CK)

Even better if you have:

  • A degree.

  • Certifications: One or more of the following certifications Network+ and/or A+and/or Security+, Splunk Core Certified User / Power User, SANS GCIA, GCIH, GREM or GPEN, ITIL Foundations.

  • Knowledge of the intelligence lifecycle, procedures and concepts within OSINT, online research tools, and cyber threats trends

  • Knowledge of attack vectors and how applications and systems are compromised.

  • Knowledge of Vulnerability Management, Monitoring, Detection, and Incident Response best practices

  • Knowledge of a broad array of security tools including Security Information and Event Management (SIEM) system, intrusion detection systems, web proxy systems, threat intelligence platforms and other tools used to assess network security

  • Knowledge of threat trends, various threat actor groups, their TTPs, intrusion activities, and geopolitical relevance.

  • Understanding of Networking (including the OSI Model, TCP/IP, DNS, HTTP, SMTP), System Administration, and Security Architecture

  • Knowledge of current cyber security tools and technologies.

  • Knowledge of NIST and ITIL Standards, including the NIST Cyber Security Framework

  • Knowledge of Security Information Event Management (SIEM) and Threat Intelligence Platform (TIP) usage and best practices.

  • Practical knowledge of open-source intelligence collection and threat analysis.

  • Strong analytical skills and ability to creatively challenge current methods and procedures.

  • Experience doing Threat Modelling (STRIDE) for applications and systems.

  • Knowledge of networking protocols and infrastructure designs; including routing, firewall functionality, host and network intrusion detection systems, encryption, load balancing, and other network protocols.

  • Advanced knowledge of log analysis, traffic flow analysis and experience with associated infrastructure and systems to aid in the identification of malware or other malicious behavior.

  • Strong knowledge of the technical details involved in current APT threats and exploits involving various operating systems, applications and networking protocols.

  • Experience with security products (e.g Crowdstrike, Threatstream)

  • Experience with malware analysis (automated, static, and dynamic)

  • Experience with malware reverse engineering

  • Ability to prepare concise written reports with strong attention to detail

  • Experience in directing, collecting and analysing information, including following leads, in order to produce timely and actionable intelligence.

  • Excellent writing and communication skills, attention to detail, and critical thinking skills

  • Extensive experience conveying complex data in simple, concise language

When you join Verizon...

You'll have the power to go beyond - doing the work that's transforming how people, businesses and things connect with each other. Not only do we provide the fastest and most reliable network for our customers, but we were first to 5G - a quantum leap in connectivity. Our connected solutions are making communities stronger and enabling energy efficiency. Here, you'll have the ability to make an impact and create positive change. Whether you think in code, words, pictures or numbers, join our team of the best and brightest. We offer great pay, amazing benefits and opportunity to learn and grow in every role. Together we'll go far.

Equal Employment Opportunity

We're proud to be an equal opportunity employer - and celebrate our employees' differences, including race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, and Veteran status. Different makes us better.

icon no score

See how you match
to the job

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Cyber Threat Detection Cloud Technical Analyst

Ernst & Young LLP

Posted 2 months ago

VIEW JOBS 4/30/2020 12:00:00 AM 2020-07-29T00:00 EY Technology: Technology has always been at the heart of what we do and deliver at EY. We need technology to keep an organization the size of ours working efficiently. We have 250,000 people in more than 140 countries, all of whom rely on secure technology to be able to do their job every single day. Everything from the laptops we use, to the ability to work remotely on our mobile devices and connecting our people and our clients, to enabling hundreds of internal tools and external solutions delivered to our clients. Technology solutions are integrated in the client services we deliver and is key to us being more innovative as an organization. EY Technology supports our technology needs through three business units: Client Technology (CT) - focuses on developing new technology services for our clients. It enables EY to identify new technology-based opportunities faster, and pursue those opportunities more rapidly. Enterprise Technology (ET) - ET supports our Core Business Services functions and will deliver fit-for-purpose technology infrastructure at the cheapest possible cost for quality services. ET will also support our internal technology needs by focusing on a better user experience. Information Security (Info Sec) - Info Sec prevents, detects, responds and mitigates cyber-risk, protecting EY and client data, and our information management systems. The opportunity The Cyber Threat Detection - Cloud Analyst role will be responsible for the management and enhancement of globally deployed security sensor and SIEM rulesets and configurations in response to project and mission demands. This role will work closely with Cyber Threat Intelligence, Incident Response, and monitoring analysts to define and tune rules and device security policies to meet mission requirements. Skills and attributes for success Essential Functions of the job: * Implement and tune detection methodologies across the MITRE ATT&CK framework on Azure Security Center, Cloud App Security, MS Sentinel, and other cloud products. * Responsible for creating, tuning and enhancing security policies on SIEM, IDS, EDR, and full packet capture tools, with a significant focus on Cloud Security * Work with project teams to design, implement, and distribute monitoring policies * Provide the Cyber Defense team guidance on Cyber threat detection best practices, technical requirements and integration * Develop and maintain expertise in a wide variety of technology platforms, threat vectors, and threat actors and communicate it to non-technical and technical personnel * Manage and improve information security documentation as required * Work with other operational teams to resolve incidents and report on events * Provide support during investigations and hunt missions when required * Work with Information Security teams to manage and maintain security posture To qualify for the role, you must have: * Ability to show analytical expertise, strict attention to detail, excellent critical thinking, logic, and solution orientation, and learn and adapt quickly * Ability to be comfortable with briefing managers and C-suite level audiences * Demonstrated integrity in a professional environment * Knowledge of standard change management procedures * Excellent teaming skills with domestic and internationally located teams * Excellent ability at building relationships with other organizational groups * Promote a security-first mind set, ensuring decisions are made without compromising core security objectives Experience: * 6+ years of relevant experience in one or more of the following areas: cloud technologies and platforms, threat intelligence, intrusion analysis, incident response, malware analysis, security and network operations, or similar roles. * Knowledge of cloud based security authentication & directory methodologies (AzureAD, AWS Directory Services, etc.) * Experience with ASC, MCAS, Azure IDP, PIM, including policy modification & custom rule creation * Competency working with all layers of cloud environment (IaaS, SaaS, PaaS) * Applied knowledge of cloud based enterprise systems architecture * Direct experience working with cloud computing tools & technologies with a focus on security fundamentals (Azure, AWS, etc.) * Conceptual understanding of IDS rules including common standards like Snort and Yara * High competency on IP networking technology, to include addressing, routing, common protocol usage, use of proxies, load balancers, firewalls, routers, and switches in network architecture. * Demonstrated understanding of the threat intelligence life cycle, network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs). Preferred: * Some hands-on experience as an administrator configuring one or more of SIEM, Endpoint Protection, Vulnerability Scanners, or Data Loss Prevention, sufficient to make common changes unassisted. * Demonstrated hands-on experience analyzing high volumes of logs, network data and other attack artifacts * Proficient with one or more scripting languages such as Perl, Python, PowerShell etc. in a threat intelligence or incident response environment * Experience with Splunk and Splunk Enterprise Security or ELK Supervising Responsibilities: * This role will not have supervisory responsibilities. Qualifications, certifications and Education requirements: * Under Graduate/Post Graduate Degree in Computer Science or Engineering or related domain (MCA/MTech/BTech/BCA /BSc CS or BSc IT) or equivalent industry experience. Desired Certifications: * Candidates holding a CISSP, CISM, CISA, GIAC or similar certification, is a plus What working at EY Offers We offer a competitive remuneration package where you'll be rewarded for your individual and team performance. Our comprehensive Total Rewards package includes support for flexible working and career development, and with FlexEY you can select benefits that suit your needs, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions. Plus, we offer: * Support, coaching and feedback from some of the most engaging colleagues around * Opportunities to develop new skills and progress your career * The freedom and flexibility to handle your role in a way that's right for you EY is committed to being an inclusive employer and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance. About EY As a global leader in assurance, tax, transaction and advisory services, we're using the finance products, expertise and systems we've developed to build a better working world. That starts with a culture that believes in giving you the training, opportunities and creative freedom to make things better. Whenever you join, however long you stay, the exceptional EY experience lasts a lifetime. And with a commitment to hiring and developing the most passionate people, we'll make our ambition to be the best employer by 2020 a reality. If you can confidently demonstrate that you meet the criteria above, please contact us as soon as possible. Join us in building a better working world. Apply now. EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, or disability status. Ernst & Young LLP Alpharetta GA

Senior Cyber Threat Intelligence Analyst

Verizon Communications