The Cyber Intelligence Analyst Role is a position providing an opportunity to work in a fast paced collaborative environment defending Verizon from current and future cyber threats. This position plays a critical role in Verizons enterprise computing defense. Analysts must be agile, willing to learn, and able to think outside of the box in order to operate effectively in an ever changing threat landscape.
Ingests and interprets internal and external Cyber Threat Intel for determination of potential threat and impact, hunting to determine potential scope, and implementation of mitigations to defend Verizons enterprise; this includes reports from law enforcement, security researchers, industry leaders and governmental agencies.
Provides leadership in assessing new threat vectors, evaluating the effectiveness of current controls and utilizing intelligence analysis to create proactive mitigation around threats and vulnerabilities.
Proactively prevents external disruption to our infrastructure, unauthorized data exfiltration and threat actors from compromising any of the computing devices on our network/systems by leveraging the cyber kill chain methodology which includes reconnaissance, weaponization, delivery, exploitation, installation, command & control and action.
Develop intelligence on, characterize, and track threat actors activities, ranging from tactical level capabilities to global operations
Utilizes independent judgment on the validity of reports, intelligence intake, and noted Indicators of Compromise (IOCS)
Recommends new intel feeds and changes to current feed intake which may include examining/monitoring the dark web and other external sources to identify potential threats.
Leverages advanced investigative skills to initiate pivoting analysis on Threat Intelligence to identify current impact or proactively process mitigations for defense through security technologies and proactive mitigations including zero-day patching identification and anomalous behavior.
Initiates data trending and correlation of cyber intelligence for the purposes of attribution and establishing strategic countermeasures to increase Verizons defenses, including customized signatures and in-house identified indicators of compromise and behaviors.
Provide technical intelligence briefings / presentations while partnering with various lines of business to triage security events and report on impacting security incidents.
Continually and consistently review triage processes to identify reforms that could add toincreased speed, efficiency and accuracy in reporting and threat detection.
Identify, document and share related tactics, techniques and procedures (TTPs) and Indicators of Compromise (IOCs) across all internal/external repositories
Leads the evaluation, development, and recommendation of specific technology products and platforms to provide cost-effective solutions that meet business and technology requirements
Develops, creates, and drives current and new reporting methods of Intelligence analysis to peers and leadership teams for purposes of situational awareness and making Intelligence actionable
Supports junior team members in methods to process tactical mitigations based on results of analysis and determination of threat validity
Drives support for the Threat Management Center during incident response and threat monitoring activities to include intelligence context and analysis support, provide industry expertise and recommend relevant remediation and countermeasures
What were looking for...
Youll need to have:
Bachelors degree or four or more years of work experience.
Previous Information Assurance or Cyber Experience in the Telecommunications industry.
Previous experience working in a Security Operations Center or Intelligence Function with focus on Computer Network Defense.
Previous experience working with SIEM technologies (i.e. Splunk).
Previous experience working with hunting tools and technologies.
Fundamentals of Mobile Platforms: Windows Phone, iOS, Android.
Understanding of Networking (including the OSI Model, TCP/IP, DNS, HTTP, SMTP).
Previous experience with Malware Reverse Engineering.
Previous experience with Threat Intelligence Tools and Platforms.
Previous experience in Cyber Intelligence or related disciplines.
Previous experience with Malware analysis (automated, static, and dynamic).
Demonstrated knowledge and understanding of cyber risks and threat intelligence related to cyber attackers.
Strong communication and presentation skills along with the ability to work in a highly collaborative environment.
Strong relationship skills and collaborative style to enable success across multiple partners.
Demonstrated effective organizational and technical skills.
Effective verbal and written communication skills.
Ability to write intelligence and technical articles for knowledge sharing.
Three or more years of professional experience.
Related Certification (A+, Network+, and/or Security+).
Ability to comply with any regulatory requirements.
Manages multiple priorities in a dynamic environment.
Exhibited initiative, follow-up and follow through with commitments.
When you join Verizon...
Youll be doing work that matters alongside other talented people, transforming the way people, businesses and things connect with each other. Beyond powering Americas fastest and most reliable network, were leading the way in broadband, cloud and security solutions, Internet of Things and innovating in areas such as, video entertainment. Of course, we will offer you great pay and benefits, but were about more than that. Verizon is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Verizon.
Equal Employment Opportunity
We're proud to be an equal opportunity employer- and celebrate our employees' differences,including race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, and Veteran status. Different makes us better.
* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.