What are the responsibilities and job description for the Senior Threat Intelligence Analyst position at Banduri?
About Banduri
Banduri helps organizations execute digital transformations with agility so that continuous innovation becomes their core competency. Core to Banduri's values and culture is the belief that everyone deserves to thrive. Our mission is to leave things better than we found them, make things that matter, and help our customers harness the power of change. We know that to do this requires radical candor, a dedicated focus on the users, and creativity. There are no big egos here. We are collaborators and team players. We want solutions-oriented problem solvers, critical thinkers, and committed creators that are passionate about what they do.
We are currently hiring a SENIOR CYBER THREAT INTELLIGENCE ANALYST to support a federal agency.
MUST BE A US CITIZEN AND PASS BACKGROUND CHECK
Position Location:
This position offers hybrid work options. Our office is in Fredericksburg, VA right next to the Fredericksburg (FBG) Amtrak/VRE station.
Position Description:
Responsible for anticipating and responding effectively to cyber threats. Leverages advanced knowledge of cyber threat actors, tactics, techniques, and procedures (TTPs) to assist the Government in collecting, assessing, and disseminating actionable intelligence on emerging and evolving threats. Conducts in-depth research and analysis of threat indicators, including malware, phishing campaigns, and infrastructure, to uncover patterns and trends indicative of potential cyber-attacks. Collaborates closely with internal teams and external partners to enhance threat detection capabilities, develop threat hunting strategies, and optimize security controls.
Key Responsibilities:
· Identify emerging cyber threats, vulnerabilities, and attack trends based on information from various sources, including open-source research, dark web forums, and threat intelligence feeds
· Conduct in-depth analysis of cyber threat intelligence data to identify patterns, trends, and indicators of compromise (IOCs) associated with potential cyber-attacks
· Produce high-quality written and oral reports, briefings, and presentations to communicate cyber threat intelligence findings, assessments, and recommendations to senior leadership, stakeholders, and technical teams in a clear and actionable manner
· Proactively search for signs of malicious activity within the organization's network and systems utilizing threat intelligence to identify and investigate potential security incidents or anomalies
· Enhance the organization's cyber threat intelligence capabilities and methodologies in accordance with the latest cybersecurity threats, trends, and technologies
· Contribute to the development of cybersecurity strategies, policies, and procedures based on threat intelligence insights and analysis
· Participate in information sharing initiatives and collaborate with industry peers, government agencies, and cybersecurity communities to exchange threat intelligence and enhance collective cyber defense capabilities
· Collaborate with vulnerability management teams to prioritize and assess the severity of vulnerabilities based on threat intelligence data, enabling informed decisions on patching and remediation efforts
· Provide written recommendations on Government drafts of executive summaries and briefings
· Provide recommendations and input on other content and presentations
· Incorporate data from Mandiant, federal partners, and other vendors to expand threat awareness and bolster proactive defense strategies
· Examine malware samples from diverse sources using reverse engineering techniques to uncover capabilities, origins, and threat actor methodologies
· Detect and study emerging vulnerabilities, attack trends, and threat patterns through internal data, open-source intelligence, and integrated feeds from trusted platforms
· Use Splunk and other tools to identify unusual activities, create actionable alerts, and monitor potential security incidents in real time
Required Experience:
· 10 years of experience in conducting in-depth analysis of cyber threats, including malware, phishing campaigns, and other attack vectors
· 10 years of experience in collecting and aggregating threat intelligence from various sources, such as open source intelligence (OSINT), dark web forums, and commercial threat intelligence feeds
· 10 years of experience in producing written and oral reports, briefings, and presentations to communicate threat intelligence findings, assessments, and recommendations to stakeholders at all levels of the organization
· 5 years of experience with Microsoft Office tools (Word, PowerPoint, Excel, OneNote)
· 5 years of experience using cybersecurity tools and technologies for threat intelligence analysis, such as threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and malware analysis tools
Required Education and Certifications:
· Bachelor’s degree in Cybersecurity
· Security
· Network or equivalent (preferred)
Banduri is committed to a diverse and inclusive workplace. Banduri is an equal opportunity employer and does not discriminate on the basis of race, national origin, gender, gender identity, sexual orientation, protected veteran status, disability, age, or other legally protected status.