This site uses cookies. To find out more, see our Cookies Policy

Cyber Threat Intelligence Analyst, Senior in Blue Ash, OH at Booz Allen Hamilton Inc.

Date Posted: 4/25/2019

Job Snapshot

Job Description

Job Number: R0048878

Cyber Threat Intelligence Analyst, Senior

The Challenge:

Everyone knows security needs to be “baked in” to a system architecture, but you actually know how to bake it in. You can identify and implement ways to harden systems and reduce their attack surface. What if you could use your Cyber engineering skills to design and build secure systems for Fortune 500 clients? We’re looking for an engineer who can create solutions for clients that will stand up to even the most advanced Cyber threats.

As a Cyber threat analyst, you’ll conduct technical intelligence analysis, generate reports, and serve as a technical escalation point for internal customers. You’ll coordinate work with in-house teams to identify the right mix of tools and techniques to translate your customer’s IT needs and future goals into a plan that will enable secure and effective solutions. We need to come up with the best solution, so you’ll investigate new techniques, break free from the legacy model, and go where the industry is going. You’ll lead the team through a critical approach to network design, providing alternatives and customizing solutions, to maintain a balance of security and business needs. This is a chance to make a difference in the security of Fortune 500 clients. Your technical expertise will be vital as you help customers overcome their most difficult challenges by integrating secure practices like like network/endpoint based detection and technical intelligence reporting. You’ll be able to broaden your skillset into areas like IDS signature authoring, reverse engineering, and security tool automation while building peace of mind in a critical infrastructure. Join our team, as we improve our clients' security posture through cyber security.

Other responsibilities include analyzing a variety of information and intelligence relevant to the threats facing the systems, assets, and resources critical to the nation and develop relevant research studies and recommendations. Conduct technical intelligence analysis and serve as a technical intelligence resource supporting internal clients. Lead or participate in approved studies and provide additional analysis in response to specific threats and incident reports, as needed. Lead the planning and implementation of large programs in the function and interface regularly with senior management and executive leadership. Provide advice and counsel to the organization in the area of expertise. Work closely with and mentor junior analysts in a Cyber Fusion Center (CFC) environment. Play a role in overall functional strategic planning.

Empower change with us.

Build Your Career:

Rewarding work, fun challenges, and a ton of investment in our people—that’s Booz Allen Cyber. When you join Booz Allen, we’ll help you develop the career you want.

  • Competitions — From programming competitions at our PyNights (Python competition and learning events) to competing in CTFs, we’ve got plenty of chances for you to show off your skills.
  • Paid Research — Have an innovative idea to explore or hypothesis to test? You can participate in challenges via our crowdsourcing platform, the Garage, and other programs to be awarded dedicated time and/or funding to advance your skills.
  • Cyber University — CyberU has more than 5000 instructor-led and self-paced cyber courses, a free online library that you can access from just about anywhere—including your phone—and certification exam prep guides that include practical assessments to prepare you for your exam.
  • Academic Partnerships — In addition to our tuition reimbursement benefit, we’ve partnered with University of Maryland University College to offer two graduate certificate programs in Cybersecurity—fully funded without a tuition cap.
  • Maker/Hackerspaces — Race drones, print 3D gadgets, drink coffee from our Wi-Fi coffee maker, and get hands-on training on tools and tech from in-house experts in our dedicated maker and hackerspaces.

You Have:

-5+ years of experience with Cybersecurity, threat intelligence, Hunt, Red Team, penetration testing, or traditional intelligence

-Experience with collecting, analyzing, and interpreting qualitative and quantitative data from multiple sources for the purposes of documenting results and analyzing findings to provide meaningful products

-Experience with Cyber, computer network operations and manipulation, information operations or information warfare, or topical Cyber expertise

-Experience with conducting technical intelligence analysis and serving as a technical intelligence resource supporting internal clients

-Knowledge of malware types, malware analysis tools and procedures, and how to report malware analysis output

-Knowledge of Linux and Intrusion Detection Systems, including Snort, Suricata, or Bro, Yara, network protocols, or other security tools

-Ability to write high-quality intelligence assessments and briefings for a senior-level audience and provide a writing sample

-Ability to develop specific expertise, discern patterns of complex threat actor behavior, and communicate comprehension of current and developing Cyber threats

-Ability to travel up to 20% of the time

-BA or BS degree in Information Security or CS or 8 years of experience in working with Cybersecurity

Nice If You Have:

-Experience with clearly defining complex issues despite incomplete or ambiguous information

-Knowledge of scripting languages, API functionality, and data access methodologies

-Ability to operate in a fast-paced work environment, multi-task, and handle truncated delivery deadlines

-Ability to work closely with and mentor junior analysts in a CFC environment

-Possession of excellent writing skills

-Possession of excellent oral and written communication skills

-MA or MS degree in CS, Information Systems, or a related field a plus

We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.

#LI-AH1, APC3, DH1

Your Career is Waiting.

Get job alerts. Learn about new work and upcoming events. Share open roles with friends and colleagues.
Our Talent Network is your opportunity hub.

Get Answers and Access.

Need more information? Find it in our FAQs.

Application already in-process? Log in to keep going.