Threat Intelligence Analyst II

Cybersecurity San Antonio, Texas


Description

We are seeking a Threat Intelligence Analyst II to join our team in San Antonio, TX!

PRIMARY RESPONSIBILITY: Responsible for ensuring that Rackspace identifies and assesses threats to its network and data, monitors its network for malicious activity, investigates intrusions and other relevant events, and has a sophisticated and detailed understanding of the evolving threat landscape.

KNOWLEDGE/SKILLS/ABILITY: Strong attention to detail. Strong verbal and written communication skills. Strong analytical and problem solving skills. Practical experience with Linux and Windows operating systems. Familiarity with common programming or scripting languages. Working knowledge of log, network, and system forensic investigation techniques. Working knowledge of diverse operating systems, networking protocols, and systems administration. Working knowledge of common indicators of compromise and of methods for detecting these incidents. Working knowledge of TCP/IP Networking and knowledge of the OSI model. Working knowledge of OS management and Network Devices. Working knowledge of Intrusion Detection/Prevention Systems. Practical experience monitoring threats via a SIEM console. Practical experience identifying indicators of compromise and of methods for detecting these incidents. Practical experience analyzing threat intelligence sources and determining their applicability to the organization, determining mitigation and compensating controls and applying these to the tooling. Practical experience with Intrusion Detection/Prevention Systems. Practical experience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs, or intrusion prevention logs. Excellent problem solving, critical thinking, and analytical skills - ability to de-construct problems. Experience with packet analysis (Wireshark) and malware analysis preferred.

JOB COMPLEXITY: Provides significant contributions assessing and disseminating threats related to the enterprise in regards to current vulnerabilities by updating the existing threat information/model. Keeps up-to-date knowledge of new and emerging threats that can affect the organization's information assets through OSINT and commercial research and documents these findings in briefings which are presented to leadership. Reviews other team members threat intelligence documentation and provides feedback and opportunities for enrichment. Documents threat intelligence research and observations in tickets and written artifacts, identifies mitigating/ compensating controls, and applies detection sets to the tooling. Conducts analysis using a variety of tools and data sets to identify indicators of malicious activity on the network. Respond to computer security incidents and conduct threat analysis as directed. Provide accurate and priority driven analysis on cyber activity/threats. Perform payload analysis of packets. Detonate malware to assist with threat research. Conducts analysis using a variety of tools and data sets to identify indicators of malicious activity on the network. Provides input to assist with implementation of counter-measures or mitigating controls. Collaborates with incident response analysts to provide indications and warnings, and contributes to predictive analysis of malicious activity. Participate in root cause analysis or lessons learned sessions. Write technical articles for knowledge sharing. Monitor threat actors and related threat objects for items of interest to Rackspace and keep information up to date. Work with the ISOC teams to emulate attacker activity. Deploys new rules and rule sets as released by the vendors and works with the ISOC teams to implement applicable Indicators of Compromise (IOCs) into tooling.
SUPERVISION: General instruction on routine tasks, detailed instruction on new assignments.

EXPERIENCE/EDUCATION:
  • Bachelor’s degree in Computer Science or related field required.
  • 4 years of Military Service may substitute for the degree requirement.
  • At the manager’s discretion, additional relevant experience may substitute for the degree requirement.
  • Typically requires 2-4 years experience performing threat research and implementation of rules and IOCs into tooling.
  • Experience applying ethical hacker techniques, phishing schemes, evaluating emerging logical security threats, and compromised server techniques preferred.
  • Current GCIA and related certifications preferred.
PHYSICAL DEMANDS: General office environment. May require long periods sitting and viewing a computer monitor. Moderate levels of stress may occur at times. No special physical demands required. Occasional domestic travel, less than 10%