Cyber Technical Analyst

Employer
Looking Glass Cyber
Location
Baltimore, MD
Posted
Jul 17, 2017
Closes
Jul 20, 2017
Function
Analyst
Hours
Full Time
Job Description CYBER TECHNICAL ANALYST Level Experienced Salary Range Undisclosed Job Location USA-MD-Baltimore Travel Percentage None Position Type Full Time Job Shift Day Education Level 4 Year Degree Job Category Information Technology LookingGlass has an immediate opening for a motivated Cyber Technical Analyst to join LookingGlass' world-class Global Security & Intelligence division. As a Cyber Technical Analyst, you will collect information on technical cyber threats and generate intelligence to assess threats relevant to client needs. Intelligence activities include researching current and emerging threats, malware analysis, campaign assessment, data collection and analysis, and network forensics. OVERVIEW OF POSITION: Extensive knowledge of malware analysis, leveraging malware sandbox technologies, and incorporating malware findings into alerts, reports, and briefings; Perform malware reverse engineering and behavioral analysis; Support client intelligence collection objectives, develop and refine intelligence requirements, product alerts, briefings, and reports on a daily basis; Maintain knowledge of the overall threat landscape (cyber, malware, botnets, DDoS, geo-political, etc.); Research threat actors; Perform analysis on cyber security events; Add context to threat indicators to convey urgency, severity, and credibility; Engage with the client to identify intelligence and information requirements; Cultivate and assess new sources of threat information and intelligence; Improve the detection, escalation, containment and resolution of incidents. QUALIFYING REQUIREMENTS : Bachelor's degree required; Relevant experience in intelligence, technology, and cyber-security is required; Knowledge of intrusion analysis, network and host forensics; Understanding of application vulnerabilities; Familiarity with Network Protocols; Knowledge of information security threat types and their indicators of compromise (IOCs); Understanding of various attacker tactics, techniques, and procedures (TTPs); Knowledge of computer security incident investigation and response; Proficient experience in all phases of the intelligence lifecycle; High degree of knowledge of Social Media Platforms, blogs, IRC, message boards; Adept in performing online research or computer/database searching Ability to develop and maintain professional contacts in the security community; Ability to collect, authenticate, validate and document online evidence; Excellent writing and presentation skills; Proficient with at least one investigative tool, such as Whois, Ping, Traceroute, etc.; Possession of excellent team leadership, development, and client relationship skills; Experience performing the following are required: Analyzing common types of attacks Log analysis and reviewing security events Malware analysis/Malicious code analysis Packet-level analysis using appropriate tools DESIRED SKILL SETS: Knowledge of multiple operating systems (Windows, Linux, OSX); Scripting (Python, BASH, Perl, or Powershell); Enterprise Security knowledge; Fluency in Russian or Chinese; Prior experience in military intelligence and/or financial industry is preferred. CERTIFICATIONS REQUIRED : None