Target HQ - Northern Campus logo
Cyber Threat Intelligence Senior Analyst - Target HQ - Northern Campus Brooklyn Park, MN, USA Bookmark Share Print 686 1 8

Listing Description

****HOW TO APPLY***

Please use the following link for the posted position:

https://jobs.target.com/job/brooklyn-park/cyber-threat-intelligence-senior-analyst/1118/11561019

About us:

Target is an iconic brand, a Fortune 50 company and one of America’s leading retailers.

Target as a tech company? Absolutely. We’re the behind-the-scenes powerhouse that fuels Target’s passion and commitment to cutting-edge innovation. We anchor every facet of one of the world’s best-loved retailers with a strong technology framework that relies on the latest tools and technologies—and the brightest people—to deliver incredible value to guests online and in stores. Target Technology Services is on a mission to offer the systems, tools and support that guests and team members need and deserve. Our high-performing teams balance independence with collaboration, and we pride ourselves on being versatile, agile and creative. We drive industry-leading technologies in support of every angle of the business, and help ensure that Target operates smoothly, securely and reliably from the inside out.

The Cyber Threat Intelligence Senior Analyst role supports Target’s cyber threat intelligence collection, analysis, and dissemination of finished product to Target’s population of security operations teams, information technology teams, enterprise risk management teams, and overall executive decision makers. The Senior Analyst also coordinates with external peer groups and information security circles over cyber threats, and on the development of global cyber policy to address events ranging from intrusions, malware, DDoS, unauthorized access, insider attacks, and loss of proprietary information.

Requirements:

- BA or BS degree in International Relations, Security Studies, Intelligence Studies, Political Science, Cyber Security, related field, or equivalent experience

- Possession of excellent oral and written communication skills

- 2-4 years of experience with all-source cyber intelligence analysis

- Experience with collecting, analyzing, and interpreting qualitative and quantitative data from multiple sources

- Experience with cyber intelligence, computer network operations, information operations, information warfare, or cyber topics

- Knowledge of current hacking techniques, vulnerability disclosures, data breach incidents, and security analysis techniques

- Familiarity with link-analysis methods and software (Maltego, Palantir, Analyst Notebook)

- Ability to communicate intelligence and analysis of cyber threats in various forms (written production; briefings) for a senior-level audience

- Ability to develop specific expertise, discern patterns of complex threat actor behavior, and communicate an understanding of current and developing cyber threats

- Considerable working knowledge in one or more of the following topics: Cybercriminals, Point-of-Sale malware, - Financially motivated cyber groups, Hacktivism, DDoS attack methods, Malware variants, Mobile and Emerging Threats, Social Engineering, Insider Threats

- Can apply a variety of cyber-related analytic techniques to identify, track and support analysis of cyber threat actors and events. Examples of these techniques include, but are not limited to: Use of the Diamond Model, Kill Chain Methodology, MITRE ATT&CK Framework

Desired Experience:

- Ability to leverage well-honed online researching expertise to identify and navigate relevant online forums, including Web sites, social media, and traditional sources to support research and analysis

- Experience with targeting or analysis

- Network+, Security+, or CEH CertificationServe as an all source cyber threat intelligence analyst.

Develop and hold regional expertise on cyber network operations, emerging cyber threats and trends, and the evolving policy and regulatory framework related to cyber security.

Investigate threat information, fuse with other relevant information, and analyze data for patterns and actionable information.

Collect, analyze, catalog, and assist in the deployment of indicators of compromise (IOCs) in partnership with the Cybersecurity Incident Response Team (CSIRT) to understand incidents and help refine detection and response efforts.

Develop and maintain expertise in a wide variety of technology platforms, threat vectors, and threat actors in order to track cyber campaigns using internal and external data.

Perform analytic support focused on cyber doctrine, policies, strategies, capabilities, and intent to conduct cyberspace operations and cyber-oriented groups, individuals, organizations, tools, tactics, and procedures.

Assist with drafting, editing, critiquing, and proofreading threat intelligence assessments and briefs.

Work closely with functional senior leaders to ensure threat intelligence analysis and products are mapped to prioritized corporate assets and risks.


Listing Details

  • Citizenship: No Requirements
  • Incentives: Not Provided

 

  • Education: Bachelors Degree
  • Travel: No Travel
  • Telework: No Telecommute


About Us

NinjaJobs is a community-run job platform developed by information security professionals. Our unique approach of focusing strictly on cybersecurity positions allows us to personalize the user experience.

Our Contacts

1765 Greensboro Station Pl.
Suite 900
Tysons Corner Va 22102

(703) 594-7765