Lead Cyber Threat Intelligence Analyst

3 days left

Brooklyn Park, Minnesota, United States
Jan 27, 2017
Feb 23, 2017
Business, Other
Employment Status
Full Time
JOIN US AS A CYBER THREAT INTELLIGENCE, LEAD TECHNICAL ANALYST - CYBER SECURITYThe Technical Lead Analyst leads projects and tasks within cyber threat intelligence and across teams to increase the ability of Target Corporation to identify, detect, and respond to cyber threats.  The Technical Lead Analyst acts as a subject matter expert on multiple technical topics, including malware analysis.

Use your skills, experience, and talents to be part of a groundbreaking threat intelligence team.  As a Lead Analyst, you will:

• Leverage your technical and intelligence expertise to quickly respond to emerging threats and proactively identify capability improvements within Cyber Threat Intelligence and across the Cyber Fusion Center.

• Provide guidance and mentorship to other Cyber Threat Analysts in your areas of expertise.

• Collaborate to develop new and innovative cyber threat intelligence procedures and methods to proactively identify and respond to threats.

• Partner with the Cybersecurity Incident Response team to detect, analyze, and contain of attacks.

• Conduct in-depth research into cyber threat intelligence topics using open source and proprietary data sources

• Review and provide technical expertise to finished intelligence products

• Track cyber campaigns using internal and external data.

• Develop and maintain expertise in a wide variety of technology platforms, threat vectors, and threat actors.


• 7+ years of experience with exposure to both technical information security and intelligence analysis

• Ability to lead projects and tasks with teams of varying skill sets.

• Significant experience with network sniffers, process analysis, registry analysis, volatile memory analysis, file analysis, and malware reverse engineering.

• Ability to write and read code in a variety of scripting and programming languages.

• Ability to engineer cyber threat intelligence capabilities using commercial and open source technology.

• Understanding of buffer overflows, network traffic obfuscation/covert channels, password cracking, and application layer attacks, and the associated tools and techniques that exploit them.

• Extensive experience with information security appliances and tools, such as firewalls, proxies, netflow, and SIEMs.

• Experience with collecting, analyzing, and interpreting technical and non-technical data from multiple sources.

• Detailed knowledge of multiple complex threat actors' behavior

• Ability to apply the Cyber Kill Chain and Diamond Models to track campaigns and identify control gaps.

Desired Experience

• BA or BS degree in Computer Science, Information Systems, Cybersecurity or related field