The Judge Group - Phoenix, AZ

posted about 2 months ago

Full-time - Mid Level
Phoenix, AZ
Administrative and Support Services

About the position

As a Cyber Security Analyst, you will play a critical role in analyzing disparate information and synthesizing it into relevant actionable intelligence. Your ability to deliver accurate, timely, and professional intelligence products will be essential in supporting investigative efforts within the Cyber Security Operations Center (CSOC) and the broader Security Organization. You will be a capable communicator, engaging with both internal and external stakeholders to protect the company's critical assets. Building positive and productive relationships with business and technology teams will be a key part of your role, as will the ability to securely share actionable intelligence while maintaining Traffic Light Protocol (TLP) standards. In this position, you will be expected to have a minimum of 3 years of experience in areas such as Information Security, Enterprise Security Monitoring and Response, Security Orchestration and Automation, Information Technology, penetration testing, threat intelligence, and security architecture/design strategy. A Bachelor’s degree in Computer Science or a related field, or equivalent work experience, is required. You should possess knowledge of how advanced adversaries operate, including their tactics, techniques, and procedures (TTPs) and malware families. Experience in monitoring Open-Source Intelligence (OSINT), Social Media Intelligence (SOCMINT), and internal intelligence resources for known and emerging security threats is crucial. You will also be responsible for developing and managing relationships with high-level law enforcement officials and international counterparts, including security agencies and intelligence functions. Conducting threat hunting to identify, classify, prioritize, and report on cyber threats will be part of your daily tasks, following industry best practices. You will collect, process, catalog, and document threat information, providing expert analysis through curated intelligence briefings. Experience with public cloud platforms such as AWS, Google Cloud Platform, or Azure is also required. In collaboration with vital stakeholders, you will participate in developing effective strategies to assess and mitigate risks, manage crises and incidents, and safeguard the organization. You will direct and assist team resources in identifying, developing, implementing, and maintaining security processes, practices, and policies to reduce risks and limit exposure in all areas of information, financial, physical, personal, and reputational risk. Ensuring compliance with local, national, and international regulatory environments will also be part of your responsibilities. Additionally, you will contribute to advancing the organization's global security intelligence program, focusing on actionable data to proactively protect the company, employees, and assets. Your experience with reporting and visualization of metrics, as well as establishing and maintaining standards, processes, and procedures, will be valuable in this role. Demonstrated effectiveness in influencing cross-organizational teams and an understanding of frameworks such as NIST and MITRE ATT&CK will be beneficial. Familiarity with varied technologies, including SOAR, SIEM, cloud-based security platforms, and data analysis tools, is also expected.

Responsibilities

  • Analyze disparate information and synthesize it into actionable intelligence.
  • Deliver accurate, timely, and professional intelligence products.
  • Support investigative efforts within the Cyber Security Operations Center (CSOC) and the Security Organization.
  • Engage with internal and external stakeholders to protect the company's critical assets.
  • Build positive relationships with business and technology teams.
  • Securely share actionable intelligence while maintaining TLP standards.
  • Monitor OSINT and SOCMINT for known and emerging security threats.
  • Develop and manage relationships with law enforcement and international security agencies.
  • Conduct threat hunting to identify and report on cyber threats.
  • Collect, process, and document threat information and provide expert analysis.
  • Participate in developing strategies to assess and mitigate risks.
  • Direct and assist team resources in implementing security processes and policies.
  • Ensure compliance with regulatory environments related to privacy and data protection.
  • Contribute to the organization's global security intelligence program.
  • Report and visualize metrics, establishing and maintaining standards and procedures.

Requirements

  • Minimum of 3 years of experience in Information Security, Enterprise Security Monitoring & response, Security Orchestration and Automation, or related fields.
  • Bachelor's degree in Computer Science or related field, or equivalent work experience.
  • Knowledge of advanced adversaries' TTPs and malware families.
  • Experience in monitoring OSINT and SOCMINT for security threats.
  • Ability to conduct threat hunting and provide analysis of cyber threats.
  • Experience with public cloud platforms (AWS, Google Cloud Platform, Azure).
  • Understanding of NIST and MITRE ATT&CK frameworks.
  • Experience with SOAR, SIEM, and cloud-based security platforms.

Nice-to-haves

  • Experience in penetration testing and threat intelligence.
  • Familiarity with data analysis tools.
  • Demonstrated effectiveness in influencing cross-organizational teams.

Benefits

  • Competitive hourly salary ranging from $48.00 to $52.00 USD.
  • Opportunity for contract extension beyond 12 months.
  • Hybrid work environment.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service