Latitude
Latitude Inc is an organization providing staffing solutions and government services for companies and public sector.
Job Overview: We are seeking a highly skilled Cyber Threat Intelligence Analyst with an active TS/SCI clearance to join our cybersecurity team. The ideal candidate will be responsible for analyzing, gathering, and reporting on current and emerging cyber threats, providing actionable intelligence to mitigate potential attacks. This role requires an in-depth understanding of cyber adversary tactics, techniques, and procedures (TTPs), as well as the ability to communicate findings to both technical and non-technical stakeholders.
Responsibilities:
- Threat Intelligence Collection and Analysis: Identify and collect data on emerging cyber threats and adversarial activities from open and closed sources. Perform in-depth analysis of cyber threats, vulnerabilities, and trends that may affect the organization’s assets and operations. Provide detailed reports, briefings, and threat assessments to inform the organization’s cyber defense strategy.
- Tactical and Strategic Threat Assessments: Conduct both tactical and strategic threat analysis, identifying potential threats to the organization’s infrastructure and recommending appropriate mitigation strategies. Track threat actor activities, campaigns, and exploit trends relevant to the organization’s industry and operational environment. Develop and maintain threat profiles on key cyber adversaries, including their tools, techniques, and procedures (TTPs).
- Collaboration with Security Teams: Collaborate with incident response, vulnerability management, and SOC teams to provide actionable intelligence and context during active investigations. Work closely with other intelligence teams across government and industry to share threat intelligence and foster collaboration on threat detection and mitigation efforts. Provide real-time intelligence support during cyber incidents, ensuring timely and effective response to evolving threats.
- Reporting and Documentation: Create timely, detailed reports on emerging threats and vulnerabilities, including the potential impact on the organization and recommended countermeasures. Maintain documentation on intelligence sources, methodologies, and findings, ensuring data is actionable, accurate, and accessible to relevant stakeholders. Deliver both written and verbal intelligence briefings to executive leadership, technical teams, and other stakeholders.
- Continuous Threat Monitoring: Leverage tools, technologies, and platforms to continuously monitor cyber threat landscapes, providing early warning of potential attacks or vulnerabilities. Assess the effectiveness of current threat intelligence processes and tools, recommending improvements where necessary.
- Training and Knowledge Sharing: Provide guidance and training to security teams on emerging cyber threats, adversary TTPs, and best practices in threat intelligence. Stay current on the latest cyber threat research, technologies, and industry trends, contributing to the organization’s overall threat intelligence capabilities.
Qualifications:
- Active TS/SCI clearance is required.
- Bachelor’s degree in Cybersecurity, Information Security, Computer Science, or a related field (or equivalent work experience).
- 3-5+ years of experience in cyber threat intelligence, cybersecurity, or a related field.
- Strong knowledge of cyber threat intelligence frameworks (e.g., MITRE ATT&CK, Diamond Model) and familiarity with adversary TTPs.
- Experience with threat intelligence platforms (TIPs) and tools for data collection, analysis, and reporting.
- Knowledge of malware analysis, threat actor tracking, and understanding of exploit development and delivery mechanisms.
- Professional certifications such as GIAC Cyber Threat Intelligence (GCTI), Certified Threat Intelligence Analyst (CTIA), CISSP, or equivalent.
- Experience in military or government intelligence environments, with an understanding of federal cybersecurity policies and threat intelligence sharing protocols.
- Familiarity with scripting languages (e.g., Python) for automation and data manipulation.
- Experience with dark web monitoring, advanced persistent threat (APT) tracking, and OSINT collection.
#J-18808-Ljbffr