Threat Analyst

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

Cyber threats can be anything – and may be of human or non-human origin — that leads to the disruption or destruction of valuable data or services in the enterprise. An analysis of cyber threats must examine every element of the threat that presents an actual or conceivable security risk. This analysis and assessment is the job of the Threat Analyst.

Threat Analysts are information security professionals with skills, experience, and background knowledge in areas such as network administration and network engineering. They analyze and assess the activities of cyber criminals such as hackers and developers of malicious software. The result of this threat analysis and assessment is to provide an enterprise with best practices that will maximize protection of sensitive data while maintaining the availability, confidentiality, and integrity of the data.

A Threat Analyst is responsible for 1) technical research to collect information about Internet-based, malware-related criminal activities and the people behind them and 2) intelligence analysis of cyber criminals and their future activities based on what currently is known about them. These activities lead to the creation of threat intelligence reports that communicate the results of the analyses to the requisite people in the enterprise.

Technical skills are extremely important for this position. A Threat Analyst must demonstrate solid experience in network and operating system security across various platforms, computer network intrusion detection and prevention systems, firewalls, cyber attack methodologies and tools, and security operations and incident response technologies and methodologies.

General Educational Requirements

The minimum educational requirement to become a Threat Analyst typically is a Bachelor’s Degree in Computer Science, Information Systems, or other related field. However, some employers may waive this requirement if a candidate already has several years of experience in the field. Industry certifications generally are required and vary by employer. A security clearance may be necessary.

Additional Qualifications

Beyond the specialized technical skills in information security that are required, a Threat Analyst also should have the following:

• excellent oral, written, and interpersonal skills
• strong presentation skills to present findings and recommendations
• highly developed research and analytical skills
• strong strong organizational skills
• the ability to pay strict attention to detail

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

DUHK: The Technique That Got the VPN Compromised
Views: 2704 / December 10, 2017
What is Docker? [Series]
Views: 2976 / December 9, 2017
Wanna-Cry Ransomware
Views: 2832 / December 9, 2017
The Abyssal Depth of the Deep Web
Views: 2771 / December 8, 2017
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel