Live Chat
Contact

Cyber Intelligence Threat Analyst (TVM Engineer 2) Job in Broadview Heights, Ohio US

Cyber Intelligence Threat Analyst (TVM Engineer 2)

EVOLVER INC - Broadview Heights, OH

Posted: 4/8/2021 - Expires: 7/7/2021

Job ID: 226045859

Print 

Job Description

Cyber Intelligence Threat Analyst (TVM Engineer 2)



Job Location

US-OH-Broadview Heights






Job ID


2021-3833



Category


Information Technology



Position Type


Regular Full-Time



Overview





Evolver is a technology company serving the Federal, Commercial, and Legal markets that addresses client challenges in the present and transitions clients into the future by introducing efficient and effective IT solutions. Established in 2000, Evolver has successfully grown to be a trusted technology leader. Evolver's efforts and growth have been recognized by leading publications and organizations, including Inc. 5000 for five consecutive years, and most recently "Future 50" from SmartCEO. With a dedicated focus on client satisfaction, Evolver has proven its value time and time again, from managing day-to-day operations to skillfully navigating the implementation and support of new technologies. Evolver's core competencies are infrastructure, application development, cybersecurity, cloud, end-user support, data analytics and legal services.

We believe our employees are key to our success and continued growth. We attract and retain our diverse workforce by promoting a work-life balance with generous and flexible time off, competitive compensation and benefits, and a commitment to professional development. When you join Evolver, you join a community of talented and dedicated individuals whose abilities, skills, and actions contribute to the success of the company.

Evolver is seeking a Cyber Intelligence Threat Analyst (TVM Engineer 2)  to join our team and work 100% Remote



Essential Job Duties and Responsibilities





The Cyber Intelligence Threat Analyst (TVM Engineer 2) ensures that threats and vulnerabilities to the organization's business systems and applications (both in-house and cloud-based) are minimized. The Cyber Intelligence Threat Analyst will focus on collections based on established requirements, enrichment, and analysis of phishing, malware, and exploitable vulnerabilities. The candidate should have strong computer, language skills, and analytical abilities. The analyst will work on assignments that are varied and frequently require interpretation and independent determination of the appropriate courses of action.

The Cyber Intelligence Threat Analyst will work within the Operational and Tactical Intelligence team in EIP's Cyber Threat Intelligence Department. The position includes understanding department, segment, and organizational strategy and operating objectives, including their linkages to related areas. Makes decisions regarding own work methods, occasionally in ambiguous situations, and requires minimal direction and receives guidance where needed. Follows established guidelines/procedures.

Essential Job Functions include:

+ Review and analyze open source datasets to find threat information and use it to provide value

+ Create and deliver technical alerts and vulnerability notifications.

+ Gather and record key indicators and information about threat infrastructure and campaigns

+ Collect intelligence based on established requirements and fully analyze based on operational procedures.

+ Collect and exploit intelligence from others to support organizational goals.

+ Prepare assessments and cyber threat profiles of current events based on collection, research and analysis of open source information.

+ Provide intelligence support during incident response and forensic security investigations.

+ Process and enrich information to ensure timely, actionable, high confidence IOC's are ingested and shared with key stakeholders.

+ Conduct detailed technical analysis supported by industry accepted threat intelligence analytical frameworks, tools, and standards.

+ Work with peers to develop and test technology integrations used for automation and enrichment.

+ Apply technical knowledge of security architectures, tools and controls to proactively detect, mitigate, and resolve advanced cyberattacks and/or threats.

+ Develop and maintain threat profiles that can be used in preparation of red team exercises.

+ Apply knowledge of current cyber threats and the associated tactics, techniques, and procedures used to infiltrate computer networks.

+ Maintain or develop professional contacts in the various communities in support of operations.



Minimum Qualifications and Requirements





Required Qualifications:

+ 3+ years of cybersecurity, threat intelligence or IT experience; experience can include one or more of the following cyber-security functions:

 Cyber Threat Intelligence,
 Threat Hunting,
 System Administration,
 Intrusion Detection/Prevention,
 Monitoring, Incident Response, Digital Forensics, Vulnerability Management

Prior experience as a technical subject matter expert that has worked across organizational boundaries to analyze threats to their organizations infrastructure and services



Technical Requirements (required and desired)





**Preferred Qualifications**

+ Knowledge of advanced cyber threats, threat vectors, attacker methodology to include, tools, tactics, and procedures and how they tie into the Cyber Kill Chain or ATT&CK framework, Diamond Model etc.

+ Experience in malware detection and analysis using static and dynamic malware analysis methods.

+ Knowledge of cloud services and their attack surface

+ Knowledge of how malicious code operates and how technical vulnerabilities are exploited.

+ Experience with premium threat intelligence tooling and/or open source intelligence techniques.

+ Experience with disseminating information in accordance with TLP classification and handling protocols, to the sector through the appropriate mechanisms.

+ Experience with developing tools to enhance cyber-threat intelligence capabilities.

+ Subject matter expertise in the detection, analysis and mitigation of malware

+ Collection and analysis of artifacts including malicious executables, scripts, documents, and packet captures.



Training and Certifications (required and desired)





 Required:

Bachelor's degree in IT, Computer Science, Intelligence or equivalent
Holds certifications such as CEH, CASP+, GCED or similar training and certification.



EOE Statement





At Evolver, we foster teamwork, growth, individuality and entrepreneurialism. We value employee opinions and encourage them to make a difference by getting involved and being thought-leaders. As a part of the Evolver team, we actively promote a working and learning environment that supports a highly qualified workforce and a quality of work life that is based on trust and respect for all employees resulting in a healthy and trusting organizational culture.

 Evolver offers a comprehensive benefits plan including (but not limited to): medical, dental, vision, 401(k), life, AD&D and short term and long term disability insurance.

Evolver, Inc. is an Equal Opportunity Employer (EOE). Qualified applicants are considered for employment without regard to age, race, color, religion, sex, national origin, sexual orientation, disability or veteran status.

Identified Skills


Job Summary

Employment Type:
Full Time Employee
Job type:
Federal Contractor
Skill Based Partner:
No
Education Level:
Bachelor's degree
Work Days:
Mon, Tue, Wed, Thu, Fri
Job Reference Code
53112572
Salary
N/A
Licenses / Certifications:
N/A
Display Recommended WorkKeys®Recommended WorkKeys®:
N/A