Position: Cyber Threat Intelligence Analyst
W2 employees only
Pay $55 to $60 an hour
This position is located in downtown Los Angeles, close to major freeways and public transit. We have been working with this client for over 30 years.
This is a non-profit organization dedicated to protecting personal and proprietary information from malicious cyber threats by facilitating and promoting innovation, education, and information sharing between Los Angeles' public and private sectors. The Cyber Lab is dedicated to sharing the latest cybersecurity threat data, alerts, and intelligence gathered by the City of Los Angeles and its partners. .
Duties and Responsibilities: The analyst will report to the Cyber Lab's Executive Director. The incumbent will also work alongside the Cyber Lab Policy and Program Directors with special regards to information-sharing initiatives. The analyst's specific duties include:
- Develop threat intelligence and indicators of compromise (IOCs) from analyzing system logs, firewall logs, NIDS/HIDS alerts, WAF alerts, endpoint malware alerts and other emerging log sources/technologies
- Manage a threat intelligence platform and support a near-real time data exchange via the STIX data format and TAXII protocol
- Detect and triage security events and escalate incidents as required by SOC processes/playbooks
- Perform network forensic analysis (e.g. Netflow and PCAP) to produce accurate threat detection rules (SNORT, YARA, etc.)
- Analyze and reverse-engineer malicious files and payloads
- Collaborate and assist SOC team in Event Monitoring, Incident Response, endpoint forensics, etc.
- Compile and send daily and weekly threat intelligence reports?including lists of IOCs and news articles regarding recent cybersecurity trends?to the Cyber Lab's customer distribution list
Requirements:
- A degree from an accredited college or university
- Professional experience in cybersecurity, IT, public safety or related security development, or equivalent experience;
- Demonstrated knowledge of the current cyber threat landscape, defenses, motivations, and techniques
- Familiar with the technical aspects of malware, botnets, and other malicious tools
- Proficient with log analysis, SIEM searching, IOCs
- Familiar in scripting in at least one of the following: Python, Perl, or similar Experience with intelligence analysis tools, methods analyzing, classifying and prioritizing threats
- Proven record of exercising good judgment and professionalism in a fast-paced and/or intense working environment; strong writing and research skills
- Excellent communication skills and ability to work with the private sector, and department staff
All qualified applicants will receive consideration for employment without regard to their race, religion, ancestry, national origin, sex, sexual orientation, age, disability, marital status or medical condition.
Contact Paul
Minimum Education Required: Bachelor
Years of Experience Required: More than 5 years
Expected Travel Time: None
Cybersecurity Analyst