Skip to main content

This job has expired

Cyber Threat Intelligence Senior Analyst

Employer
Target
Location
Brooklyn Park, Minnesota
Start date
Jun 25, 2019
Closing date
Jan 16, 2020

View more

Category
Retail / Wholesale
Employment Status
Full Time
Description:
JOIN US AS A CYBER THREAT INTELLIGENCE, STRATEGIC ANALYST, CTI - CYBER SECURITY

About us

Target is an iconic brand, a Fortune 50 company and one of America's leading retailers.

Target as a tech company? Absolutely. We're the behind-the-scenes powerhouse that fuels Target's passion and commitment to cutting-edge innovation. We anchor every facet of one of the world's best-loved retailers with a strong technology framework that relies on the latest tools and technologies-and the brightest people-to deliver incredible value to guests online and in stores. Target Technology Services is on a mission to offer the systems, tools and support that guests and team members need and deserve. Our high-performing teams balance independence with collaboration, and we pride ourselves on being versatile, agile and creative. We drive industry-leading technologies in support of every angle of the business, and help ensure that Target operates smoothly, securely and reliably from the inside out.

The Cyber Threat Intelligence Senior Analyst role supports Target's cyber threat intelligence collection, analysis, and dissemination of finished product to Target's population of security operations teams, information technology teams, enterprise risk management teams, and overall executive decision makers. The Senior Analyst also coordinates with external peer groups and information security circles over cyber threats, and on the development of global cyber policy to address events ranging from intrusions, malware, DDoS, unauthorized access, insider attacks, and loss of proprietary information.

Use your skills, experience and talents to be a part of groundbreaking thinking and visionary goals. As a Cyber Threat Intel Senior Analyst, you'll take the lead as you:
  • Serve as an all source cyber threat intelligence analyst
  • Develop and hold regional expertise on cyber network operations, emerging cyber threats and trends, and the evolving policy and regulatory framework related to cyber security
  • Investigate threat information, fuse with other relevant information, and analyze data for patterns and actionable information
  • Collect, analyze, catalog, and assist in the deployment of indicators of compromise (IOCs) in partnership with the Cybersecurity Incident Response Team (CSIRT) to understand incidents and help refine detection and response efforts
  • Develop and maintain expertise in a wide variety of technology platforms, threat vectors, and threat actors in order to track cyber campaigns using internal and external data
  • Perform analytic support focused on cyber doctrine, policies, strategies, capabilities, and intent to conduct cyberspace operations and cyber-oriented groups, individuals, organizations, tools, tactics, and procedures
  • Assist with drafting, editing, critiquing, and proofreading threat intelligence assessments and briefs
  • Work closely with functional senior leaders to ensure threat intelligence analysis and products are mapped to prioritized corporate assets and risks


Core responsibilities of this job are described within this job description. Job duties may change at any time due to business needs

Requirements
  • BA or BS degree in International Relations, Security Studies, Intelligence Studies, Political Science, Cyber Security, related field, or equivalent experience
  • Possession of excellent oral and written communication skills
  • 2-4 years of experience with all-source cyber intelligence analysis
  • Experience with collecting, analyzing, and interpreting qualitative and quantitative data from multiple sources
  • Experience with cyber intelligence, computer network operations, information operations, information warfare, or cyber topics
  • Knowledge of current hacking techniques, vulnerability disclosures, data breach incidents, and security analysis techniques
  • Familiarity with link-analysis methods and software (Maltego, Palantir, Analyst Notebook)
  • Ability to communicate intelligence and analysis of cyber threats in various forms (written production; briefings) for a senior-level audience
  • Ability to develop specific expertise, discern patterns of complex threat actor behavior, and communicate an understanding of current and developing cyber threats
  • Considerable working knowledge in one or more of the following topics: Cybercriminals, Point-of-Sale malware, Financially motivated cyber groups, Hacktivism, DDoS attack methods, Malware variants, Mobile and Emerging Threats, Social Engineering, Insider Threats
  • Can apply a variety of cyber-related analytic techniques to identify, track and support analysis of cyber threat actors and events. Examples of these techniques include, but are not limited to: Use of the Diamond Model, Kill Chain Methodology, MITRE ATT&CK Framework


Desired Experience
  • Ability to leverage well-honed online researching expertise to identify and navigate relevant online forums, including Web sites, social media, and traditional sources to support research and analysis
  • Experience with targeting or analysis
  • Network+, Security+, or CEH Certification


Americans with Disabilities Act (ADA)

Target will provide reasonable accommodations (such as a qualified sign language interpreter or other personal assistance) with the application process upon your request as required to comply with applicable laws. If you have a disability and require assistance in this application process, please visit your nearest Target store or Distribution Center or reach out to Guest Services at 1-800-440-0680 for additional information.

Qualifications:

Get job alerts

Create a job alert and receive personalized job recommendations straight to your inbox.

Create alert