Cyber Threat Intelligence Operations Analyst, Cyber Security

Target

(Brooklyn Park, Minnesota)
Full Time
Job Posting Details
About Target
Minneapolis-based Target Corporation (NYSE: TGT) serves guests at over 1,800 stores and at Target.com. Since 1946, Target has given 5 percent of its profit to communities, that giving equals more than $4 million a week.
Summary
JOIN US AS A CYBER THREAT OPERATIONS ANALYST, CTI - CYBER SECURITY The Cyber Threat Intelligence Senior Analyst is responsible for the collection, analysis and dissemination of technical cyber threat intelligence including the timely collection of advanced warning of impending IT vulnerabilities or threats, a thorough correlation, analysis and storage of threat intelligence information, and operational support of the incident response process. The Senior Analyst also coordinates with external peer groups and information security circles over cyber threats to address events ranging from intrusions, malware, DDoS, unauthorized access, insider attacks, and loss of proprietary information. Use your skills, experience and talents to be a part of groundbreaking thinking and visionary goals.
Responsibilities
* Partner with the Cybersecurity Incident Response (CSIRT) team in the effective detection, analysis, and containment of attacks * Investigate threat information, fuse with other relevant information, analyze data for patterns and actionable information * Collect, analyze, catalog, and assist in the deployment of indicators of compromise (IOCs) in partnership with CSIRT to help refine detection and response efforts * Collect, analyze, catalog, and store IOCs from internal security events detected * Develop and hold regional expertise on cyber network operations, and emerging Cyber threats and trends. * Provide regional or functional analytic support, pertaining to a wide-range of cyber threat actors. * Provide critiques of written threat intelligence products for the benefit senior leaders.
Ideal Candidate
* 3 years of experience in information security, network administration, or system administration * Experience with collecting, analyzing, and interpreting technical data from multiple sources * Strong understanding of security monitoring methodologies such as packet capture, flow data (NetFlow), patterns, watch lists, black lists, log parsing, correlation, classification, event generation, taxonomy, filtering * Knowledge of current hacking techniques, vulnerability disclosures, data breach incidents, and security analysis techniques * Experience with the Cyber Kill Chain and Diamond Models * Experience with computer network operations, information operations, information warfare, or other cyber topics * Ability to develop specific expertise, discern patterns of complex threat actor behavior, and communicate an understanding of current and developing cyber threats * Ability to leverage well-honed online researching expertise to identify and navigate relevant online forums, including Web sites, social media, and traditional sources to support research and analysis **Desired Experience** * BA or BS degree in Computer Science, Information Systems, Cybersecurity or related field * Experience with emerging computer or online technologies, online social behaviors, and computer or Internet slang * Experience with targeting or analysis CISSP, GPEN or GCIH Certification

Questions

Answered by on
This question has not been answered
Answered by on

There are no answered questions, sign up or login to ask a question

Want to see jobs that are matched to you?

DreamHire recommends you jobs that fit your
skills, experiences, career goals, and more.