Sorry, the offer is not available,
but you can perform a new search or explore similar offers:

Digital Technician

Compensation $15.00 Hourly Job Description Location: Las Vegas, NV This is work from home position, but you must live in Las Vegas to be considered. ...


From Usic Locating Services, Llc - Nevada

Published 11 days ago

Security Officer- Renaissance Las Vegas Hotel - Start Immediately

We are looking for a brilliant Security Officer- Renaissance Las Vegas Hotel to join our awesome team at Highgate Hotels in Las Vegas, NV. Growing your caree...


From Highgate Hotels - Nevada

Published 11 days ago

Field Service Technician - Start Now

We are on the lookout for a focused Field Service Technician to join our dynamic team at Crown Lift Trucks® in Reno, NV. Growing your career as a Full Time F...


From Crown Lift Trucks® - Nevada

Published 11 days ago

Data Archivist Manager

WHO WE ARE 2K is headquartered in Novato, California and is a wholly owned label of Take-Two Interactive Software, Inc. (NASDAQ: TTWO). Founded in 2005,...


From 2K Vegas - Nevada

Published 11 days ago

Senior Cyber Threat Intelligence Analyst

Senior Cyber Threat Intelligence Analyst
Company:

Evergreen Technologies, Llc.


Place:

Nevada


Details of the offer

Title: Senior Cyber Threat Intelligence Analyst (CTIA) Personnel Qualifications Master's or Bachelor's degree in: Strategic Intelligence or International Securities Studies, Economics or Finance, Cyber Security, Computer Science, Telecommunications, Information Systems or Assurance, Securities Studies Capabilities Currently possess an in-scope valid/active National Security Top Secret/SCI level clearance. With master's degree, 12 years of experience applying intelligence tradecraft to write intelligence or derivative products (with at least 5 years of experience analyzing cyber threat strategic and anticipatory intelligence; some experience supporting and assessing emerging cyber threats for the U.S. Government or US financial institutions. With bachelor's degree 17 years of experience in the same areas. (Note: The position performs intelligence analysis, not threat hunting or response associated with security operations center) Applied experience with at least six of the following concepts: analytic tradecraft standards, cyber kill chain, diamond model, advanced persistent threat, cybercrime, hacktivism, cyber fraud, malware and ransomware, social engineering, incident response, threat intelligence, and host and network-based security. Advanced understanding of intelligence tools available on JWICS to maximize collation and analysis to provide relevant and timely intelligence to consumers. Demonstrates ability to work independently with minimal oversight and direction Demonstrates ability to collaborate and work with other IC members, established working groups or ad hoc multi-disciplined teams on information sharing and refining collections Solid teamwork skills, including the ability to collaborate with others who are conducting research in the same, similar, or different areas Experience in collating and assessing intelligence reports derived from multiple intelligence platforms and tools to identify relevant and timely intelligence Ability to vet, enrich, and maintain technical data, including indicators of compromise, shared from partner agencies and key stakeholders Demonstrates in-depth knowledge and understanding of advanced persistent threats, common vulnerabilities and exposures (CVE), ransomware as a service, as well as other cyber-related tactics, techniques, and procedures (TTPs). This includes understanding of Corporate and government technology (networks, hardware, software, operating systems, etc.) Cybersecurity tools / perspectives (defensive, investigative, analytical, risk, etc.) Demonstrates the ability to organize and prioritize complex time- dependent task flows (i.e., tracking and prioritizing issues and inquiries) Demonstrates competence in applying analytic tradecraft standards (ICD 203) in verbal or written finished intelligence, white papers, research studies and briefings that integrate intelligence community (IC) threat assessments and open-source reporting with proprietary Federal Reserve System (FRS) data to communicate complex relationships or impacts to FRS decision makers and stakeholders. Demonstrates ability to develop structured research to produce an integrated, timely, logical, and concise analytic reports, documents, assessments, studies, and briefing materials. Demonstrates the ability to integrate threat intelligence reports, open-source analysis, and department/agency level data into concise, insightful, and comprehensive analytic products to communicate the aggregated results to people who need to know the results (e.g., government decision-makers, security officials, senior corporate officials) Demonstrates capability in applying critical thought and detail to recognize nuances in cyber-related reporting and to resolve contradictions and inconsistencies in information Demonstrates forward thinking, e.g. "What would I do next if I were the attacker" Understanding of payment and settlement systems, money and financial markets Experience with continuing operations during emerging or ongoing events that may include a cyber of national level incident response. Certification in at least one of the following (or recognized equivalents): CISSP (Certified Information Systems Security Professional) Security+ ISSEP (Information Systems Security Engineering Professional) GIAC (Global Information Assurance Certification)


Source: Grabsjobs_Co

Requirements

Senior Cyber Threat Intelligence Analyst
Company:

Evergreen Technologies, Llc.


Place:

Nevada


Built at: 2024-05-17T01:09:54.348Z