Job Details

Cyber Intelligence Threat Analyst virtual remote home office eligible

Company name
Humana Inc.

Location
Fresno, CA, United States

Employment Type
Full-Time

Industry
It, Work At Home, Finance

Posted on
Jul 10, 2021

Apply for this job






Profile

Description

The Cyber Intelligence Threat Analyst (TVM Engineer 2) ensures that threats and vulnerabilities to the organization's business systems and applications (both in-house and cloud-based) are minimized. The Cyber Intelligence Threat Analyst will focus on collections based on established requirements, enrichment, and analysis of phishing, malware, and exploitable vulnerabilities. The candidate should have strong computer, language skills, and analytical abilities. The analyst will work on assignments that are varied and frequently require interpretation and independent determination of the appropriate courses of action.

Responsibilities

The Cyber Intelligence Threat Analyst will work within the Operational and Tactical Intelligence team in EIP's Cyber Threat Intelligence Department. The position includes understanding department, segment, and organizational strategy and operating objectives, including their linkages to related areas. Makes decisions regarding own work methods, occasionally in ambiguous situations, and requires minimal direction and receives guidance where needed. Follows established guidelines/procedures. Essential Job Functions include:

Review and analyze open source datasets to find threat information and use it to provide value to Humana.

Create and deliver technical alerts and vulnerability notifications.

Gather and record key indicators and information about threat infrastructure and campaigns.

Collect intelligence based on established requirements and fully analyze based on operational procedures.

Collect and exploit intelligence from others to support organizational goals.

Prepare assessments and cyber threat profiles of current events based on collection, research and analysis of open source information.

Provide intelligence support during incident response and forensic security investigations.

Process and enrich information to ensure timely, actionable, high confidence IOC's are ingested and shared with key stakeholders.

Conduct detailed technical analysis supported by industry accepted threat intelligence analytical frameworks, tools, and standards.

Work with peers to develop and test technology integrations used for automation and enrichment.

Apply technical knowledge of security architectures, tools and controls to proactively detect, mitigate, and resolve advanced cyberattacks and/or threats.

Develop and maintain threat profiles that can be used in preparation of red team exercises.

Apply knowledge of current cyber threats and the associated tactics, techniques, and procedures used to infiltrate computer networks.

Maintain or develop professional contacts in the various communities in support of operations.

Required Qualifications

Required: Bachelor's degree in IT, Computer Science, Intelligence or equivalent

3 years of cybersecurity, threat intelligence or IT experience; experience can include one or more of the following cyber-security functions: Cyber Threat Intelligence, Threat Hunting, System Administration, Intrusion Detection/Prevention, Monitoring, Incident Response, Digital Forensics, Vulnerability Management

Holds certifications such as CEH, CASP , GCED or similar training and certification.

Prior experience as a technical subject matter expert that has worked across organizational boundaries to analyze threats to their organizations infrastructure and services.

Preferred Qualifications

Knowledge of advanced cyber threats, threat vectors, attacker methodology to include, tools, tactics, and procedures and how they tie into the Cyber Kill Chain or ATT&CK framework, Diamond Model etc.

Experience in malware detection and analysis using static and dynamic malware analysis methods.

Knowledge of cloud services and their attack surface.

Knowledge of how malicious code operates and how technical vulnerabilities are exploited.

Experience with premium threat intelligence tooling and/or open source intelligence techniques.

Experience with disseminating information in accordance with TLP classification and handling protocols, to the sector through the appropriate mechanisms.

Experience with developing tools to enhance cyber-threat intelligence capabilities.

Subject matter expertise in the detection, analysis and mitigation of malware

Collection and analysis of artifacts including malicious executables, scripts, documents, and packet captures.

Healthcare or Financial industry experience

Additional Information

Scheduled Weekly Hours

40

Company info

Humana Inc.
Website : http://www.humana.com

Similar Jobs:
Description The M&A Lead Solutions Architect works with Humana's technology organization and our internal user groups to solve Integration initiatives with available technology including hardware, software, databases, and periphe...
Description The Network Engineer 2 designs, analyzes, plans and modifies network components supporting customer communication implementation activities. The Network Engineer 2 work assignments are varied and frequently require in...
Best Buy As an Assistant Store Manager - Sales, you will deliver a world-class customer experience while playing a vital role in implementing sales strategies, analyzing business results. Delivering on all aspects of the sales exp...
I was very pleased with the InformationTechnologyCrossing. I found a great position within a short amount of time … I definitely recommend this to anyone looking for a better opportunity.
Jose M - Santa Cruz, CA
  • All we do is research jobs.
  • Our team of researchers, programmers, and analysts find you jobs from over 1,000 career pages and other sources
  • Our members get more interviews and jobs than people who use "public job boards"
Shoot for the moon. Even if you miss it, you will land among the stars.
InformationTechnologyCrossing - #1 Job Aggregation and Private Job-Opening Research Service — The Most Quality Jobs Anywhere
InformationTechnologyCrossing is the first job consolidation service in the employment industry to seek to include every job that exists in the world.
Copyright © 2024 InformationTechnologyCrossing - All rights reserved. 168 192