Threat Intelligence Analyst

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

Data security is critical to any company’s success. The Threat Intelligence Analyst serves as part of the team that partners with customers, project managers, and Network Engineers to design and deliver the tools and procedures that keep data safe by defending against breaches and keeping networks reliable and secure.

The Threat Intelligence Analyst provides the cyber intelligence that will prevent, detect, and respond to security incidents. This intelligence is used for analysis and research, and it results in written analysis products used by internal and external stakeholders.

A Threat Analyst conducts cyber intelligence operations including intelligence collection (especially indicators of system compromises and/or intrusions), tracking threat actors, identifying and tracking malicious code that affects assets and infrastructure. The Analyst supports the development and integration of tools used to store, exchange, and analyze threat and incident data.

The Analyst must have the experience and background to carry out the following activities:

  • collect and collate information about Internet-based, malware-related criminal actors and activities
  • design and build programs to automate information extraction from networks
  • design and build programs to automate information extraction from threat reporting infrastructure
  • collaborate in the threat intelligence collection process with the enterprise’s analysis and tech support teams

General Educational Requirements

This position generally requires a Bachelor’s Degree, and a Master’s Degree may be preferred. It is highly recommended that course work include Cybersecurity courses. Industry certifications are important, and a current US government clearance – or the ability to acquire one – may be required. Some employers may require passing financial and criminal background checks.

Additional Qualifications

In addition to a solid technical background Threat Intelligence Analyst should be of excellent character and must possess a high degree of discretion when handling sensitive information. The Analyst also must be capable of contributing to threat intelligence reports and must have a proven ability to design, draft, and publish high-quality technical and business-level reports, studies, and white papers.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

DUHK: The Technique That Got the VPN Compromised
Views: 2701 / December 10, 2017
What is Docker? [Series]
Views: 2974 / December 9, 2017
Wanna-Cry Ransomware
Views: 2831 / December 9, 2017
The Abyssal Depth of the Deep Web
Views: 2769 / December 8, 2017
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel