Listing Description
Job Description
· Work with customers to determine their intelligence needs and requirements and to identify the most effective methods for fulfilling these unique requirements
· Use knowledge, creativity, and analytic tradecraft best practices to generate solutions to complex problems where analysis of situations or data requires an evaluation of intangible variables under conditions of uncertainty
· Correlate intelligence, to develop deeper understandings of tracked threat activity
· Produce custom analytic products (written products, briefings, and graphics) for customers and internal teams based on conclusions and judgments derived from Mandiant data sources and independent research
· Work independently to meet tight deadlines
· Work closely with the other Mandiant teams to contribute to intelligence products, collection processes, and the data model
· Collaborate across the organization to stay up-to-date on cyber developments, Mandiant analytic stances, and previous Mandiant reports and briefings
· Provide some level of off-hours support for customer requests on a rotating basis
· Maintain confidentiality and ethics within the framework of the engagement
· Apply basic threat hunting techniques to pivot for given information to known attack patterns, malicious code families, tracked threat groups and other historical information
· Pivot through open-source and internal frameworks for related data associated with potentially malicious IOCs, such as:
o IP addresses
o URLs
o Domains
o Hashes
Qualifications
· Strong communication skills and the ability to build a compelling and effective analytic narrative
· 2+ years of experience in an analytical or operational role (e.g. intelligence, threat analysis, security consulting)
· 1+ years practical experience analyzing cyber threats and a an understanding of technical and cyber security concepts
· A functional understanding of:
o core cybersecurity concepts and risk management frameworks
o common enterprise IT infrastructure components
o operating system internals
o file systems and binaries
o networking
- Familiar with the following areas and associated tools: intrusion operations, enterprise security controls, email analysis, log analysis, network flow and traffic analysis, malware triage, incident response processes, cyber attack lifecycles and models
· Ability to express complex technical and non-technical concepts verbally, graphically, and in writing for generalist and specialist audiences
· Demonstrated success applying research methods and analytic techniques to independently address complex analytic problems
· Experience utilizing open source tools for analysis
· Ability to work as part of a fast-paced, distributed virtual production team with limited supervision and under tight deadlines
· Ability to participate and provide input during business-critical situations
· Strong interpersonal skills with a customer-oriented attitude
Listing Details
- Citizenship: Not Provided
- Incentives: Not Provided
- Education: Not Provided
- Travel: Not Provided
- Telework: Not Provided