Senior Intelligence Analyst – Cyber Security

Blackbaud

We are looking for an accomplished, high-performing Senior Cyber Threat Intel Analyst for our Cyber Threat Intel team with experience gathering cyber intel from multiple sources and aggregating that data to produce usable and actionable Cyber Threat Intelligence.  The Senior Cyber Threat Intel Analyst is responsible for ensuring we are monitoring and analyzing threats past, present and future relevant to protecting Blackbaud.  This role requires a deep understanding of intel sources and the ability to aggregate and translate into actionable information.

What you’ll do:

  • Researches, collects, distills, and disseminates tactical, strategic and operational intelligence to key stakeholders/teams.
  • Provides technical support, analysis and recommendations in the areas of attack and vulnerability trends, incident handling and network defense.
  • Coordinates with Management and decision makers to deliver timely and actionable hands-on intelligence delivered in a clear, concise manner.
  • Work with various intelligence sources to maintain an agile and cutting-edge security posture for current threats.
  • Alert detection, IR teams and key stakeholders/teams to emerging threats in a timely manner.
  • Leverage and expand the capabilities of existing analytical tools and technologies; recommend new technologies as appropriate.
  • Enhance existing processes through implementation of existing or new structured analytical techniques.

What you’ll bring:

  • 5+ years of relevant experience in threat intelligence, intrusion analysis, incident response, malware analysis or a similar role.
  • Experience managing stakeholder relationships to ensure intelligence meets the organization’s needs.
  • Scripting/automation experience to increase process efficiency and enhance delivery of time-sensitive data.
  • Knowledge of the cyber threat landscape, including actors, TTPs, targets, etc.
  • Broad understanding of information technology, including networking, operating systems
    and web application development.
  • Experience with Threat Intelligence Platforms (open source and/or enterprise grade)
  • Ability to collect, analyze, document, and disseminate OSINT information using various
    means of collection methods.
  • Demonstrated understanding of the intelligence life cycle, network threats, attacks,
    attack vectors and methods of exploitation with an understanding of intrusion set tactics,
    techniques and procedures (TTPs).
  • Previous experience with the MITRE ATT&CK / SHIELD frameworks and/or Cyber Kill
    Chain model desired.
  • Demonstrated hands-on experience analyzing high volumes of logs, network data and
    other attack artifacts.
  • Ability to identify and remove bias in created intelligence.
  • Ability to operate in a fast-paced environment and prioritize work accordingly.

Set up job alerts and get notified about the new jobs

Similar Remote Jobs