Job Details

ID #4486657
Estado Distrito de Columbia
Ciudad Usdc
Tipo de trabajo Full-time
Salario USD TBD TBD
Fuente FireEye, Inc.
Showed 2020-08-04
Fecha 2020-08-01
Fecha tope 2020-09-30
Categoría Etcétera
Crear un currículum vítae

Senior Analyst (TS/SCI)

Distrito de Columbia, Usdc 00000 Usdc USA

Vacancy caducado!

Job Description

Mandiantis a recognized leader in cyber security expertise and has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that FireEye knows more about today's advanced threats than anyone.Mandiant Strategic Intelligence and Government (SIG) team helps share the strategic direction of the Mandiant Intelligence organization, with a focus on advancing international and public sector growth. SIG leverages Mandiant’s Advanced Intelligence Access (AIA) offering to demonstrate best-in-class value and integrates AIA with Government program management and strategic initiatives to identify and drive new intelligence opportunities. SIG helps advance the FireEye’s One Team mission by collaborating across the FireEye ecosystem with organizations such as Global Government, various sales teams, and Mandiant Consulting to deliver comprehensive support to clients.

If you have a strong background in analysis and are looking to be at the forefront of technical threat intelligence tracking, then we want to hear from you! The successful candidate should be an independent, critical thinker skilled in using data to solve analytic problems and adept in satisfying intelligence requirements under tight deadlines. The analyst’s work will be used to provide guidance, resources, and solutions for forward deployed analysts who are who are on-site with domestic and international customers.

Responsibilities:

  • Evaluate current and emerging tools and best-practices for tracking advanced persistent threats; tools, techniques, and procedures (TTPs) of attacker’s motivations, industry and attacker trends
  • Provide expert guidance and support to intelligence analysts across the United States.
  • Ensure forward deployed intelligence analysts have the tools, data and resources needed to deliver customized intel
  • Correlate intelligence, to develop deeper understandings of tracked threat activity
  • Present tactical and strategic intelligence about threat groups, the methodologies they use, and the motivations behind their activity
  • Work with customers to determine their intelligence needs and requirements
  • Convey both verbally and in writing the importance of findings for a variety of audiences
  • Prepare and deliver briefings and reports to the client’s executives, security team, or fellow analysts
  • Ability to work with little direct oversight

Qualifications

  • Active TS/SCI clearance
  • 2 + years of experience in an analytical role of either network forensics analyst, intelligence threat analyst, or security engineer/ consultant
  • 2 + years of experience in investigative or incident response environments
  • 2 + years working in a customer-facing environment
  • Exceptional oral and written communication skills
  • Excellent communication and presentation skills with the ability to present to a variety of internal audiences including senior executives
  • Excellent organizational and leadership skills
  • Outstanding communication and interpersonal abilities
  • Proven track record of successfully managing and executing on short term and long-term projects
  • Strong leadership skills with the ability to prioritize and execute in a methodical and disciplined manner
  • Ability to set and manage expectations with senior stake-holders and team members
  • Willingness to travel, upwards of 25% fo the time to California
  • Demonstrated ability to manage customer relationships

Technical Qualifications

  • Experience in evaluating host and network forensic reports of electronic media, packet capture, log data analysis, malware triage and network devices in support of intrusion analysis or enterprise level information security operations
  • Excellent knowledge of security solutions and technologies, including: Windows, Linux, Network architecture / implementation / configuration
  • Experience conducting analysis of firewall technologies, proxy technologies, anti-virus, or spam and spyware solutions (Gateway and SaaS)
  • Experience in working with threat modeling systems
  • Experience utilizing open source tools such as Maltego for analysis
  • Experience with Industrial Control Systems / Operational Technology preferred

Additional Qualifications:

  • Master’s or other professional degree preferred
  • Malware/security experience and experience with FireEye products, highly desired
  • Experience working in or with the Department of the Navy preferred
  • Program management or business experience

Additional Information

At FireEye we are committed to our #OneTeam approach combining diversity, collaboration, and excellence. All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability. Requests for accommodation due to disability can be sent directly to[emailprotected].

Vacancy caducado!

Suscribir Reportar trabajo