Sorry, this listing is no longer accepting applications. Don’t worry, we have more awesome opportunities and internships for you.

Cyber Threat Intelligence Consultant

FireEye, Inc.

Cyber Threat Intelligence Consultant

Oakland, CA
Full Time
Paid
  • Responsibilities

    Job Description

    FireEye is seeking a Cyber Threat Intelligence Consultant in Oakland, California.  The Cyber Threat Intelligence Consultant will be part of our Intelligence Capability Development (ICD) team which transforms organizations from a “technology-led” mentality to an “intelligence-driven” capability.  ICD services empower and enable clients to proactively leverage and integrate CTI across various cybersecurity functions, as well as laterally across an entire organization. The successful candidate will be responsible for executing the entire CTI Lifecycle, from guiding the organizations strategic direction for CTI, establishing a robust collections and processing framework, organizing analysis best practices, instituting production requirements, and developing dissemination protocols aligned to stakeholder requirements.

    RESPONSIBILITIES:

    • Process, organize, analyze and assist in contextualization of incident indicators
    • Support CTI collection, processing, and analysis
    • Support Tactical CTI analysis efforts (i.e. log analysis and threat hunting)
    • Provide static and dynamic malware analysis
    • Support customer operational stand-up calls & weekly updates
    • Develop engagement deliverables; Support customer briefings
    • Investigate network and host detection and monitoring systems to advise cyber defense teams
    • Develop core threat intelligence capability and subject matter expertise
    • Support CTI capability maturation
    • Support CTI stakeholder identification and requirements gathering
    • Support adjustments and tuning to existing CTI procedures
    • Integrate CTI analyst activities into existing cyber defense functions (i.e. SOC, IR)
    • Develop an organizational Threat Profile based on industry, geo location, critical assets etc.
    • Map Threat Actor capabilities to organizational defenses

    This position demands a balance of both strategic and tactical thinking, along with the application of technical and non-technical expertise.  The candidate must be able to learn quickly, adapt to unique situations, and demonstrate thought leadership.

  • Qualifications

    Qualifications

    • 3+ years’ experience in a dedicated intelligence practitioner role; Intel disciplines can vary but must have worked (currently or previously) in a dedicated Intel role to be considered.
    • High-level, functional understanding of CTI methodologies and application concepts within the modern cyber security organization
    • Direct experience in the consumption, processing, and analysis of tactical (technical) CTI within an operational environment, supporting monitoring, detection, and response capabilities
    • Experience in deploying and analyzing data from technical security controls, to include web proxy, firewalls, IPS, IDS, mail content scanning appliances, enterprise antivirus solutions, network analyzers, and other host-based protection solutions
    • Knowledge of and experience with standard network logging formats, network management systems and network security monitoring systems, security information and event management, network packet analysis tools and forensic analysis tools.
    • Strong understanding and experience related to:
      • Threat Intelligence analysis and experience managing and implementing the threat intelligence lifecycle
      • Common malware variants, functionality, and basics of static and dynamic analysis
      • Common threat actor tactics, techniques, and procedures
      • Threat Intelligence Platform (TIP) usage and best practices
      • Cyber Attack Lifecycles and Threat Models
      • Cyber Security-related process development
      • Proven written and oral communication skills and ability to quickly document research and analysis
      • Experience conducting executive debriefs of deliverables and project outcomes
      • Excellent time management skills\Research best practices and topic analysis
    • Report writing skills, able to service Strategic, Operational and Tactical audiences

    ADDITIONAL QUALIFICATIONS: 

    • Previous experience in a customer facing role and/or consulting expertise
    • Strong understanding of threat intelligence analysis and application, while conveying strategic outcomes to executive audiences
    • Scripting capabilities in Python and/or Bash
    • Knowledge of various operating systems

    Additional Information

    ​​​​​FIREEYE IS AN EQUAL OPPORTUNITY EMPLOYER: All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, national origin, protected veteran status, or on the basis of disability. Click here to view the full EEO/AA statement.