Lead Cyber Intelligence Analyst
Company | United Parcel Service (UPS) |
---|---|
Location | Newark, NJ, USA |
Salary | $Not Provided – $Not Provided |
Type | Full-Time |
Degrees | Bachelor’s |
Experience Level | Senior |
Requirements
- 3+ years as an analyst, preferably from a Security Operation Center (SOC), including Incident Response and Handling roles.
- Ability to lead a team of analysts, ensuring they stay focused, motivated, and are working toward common objectives.
- Experience with cybersecurity tools (e.g., SIEM/SOAR platforms, threat intelligence platforms, endpoint detection tools).
- Hands-on experience with incident response and understanding of attack vectors and common cybersecurity vulnerabilities.
- Expert understanding of network protocols, TCP/IP fundamentals, operating systems along with log, network and system security analysis techniques.
- Clear and concise communication and presentation of complex and complicated security topics.
- Expert knowledge of security exploitation trends and methodologies to identify anomalous patterns.
- Proven experience leading a team of highly specialized professionals to accomplish difficult tasks.
- Proven ability to present highly technical information to Decision Makers and Stakeholders.
- Education: Bachelor’s Degree Required – Master’s Degree Preferred.
- Certifications: Multiple GIAC Required.
Responsibilities
- Providing guidance and training to SOC analysts.
- Reporting to Management and Senior InfoSec Leaders about current incident handling and incident response efforts.
- Directing multiple incident-based activities and tasks.
- Actively participating in a broad range of complex technical and professional functions to identify, investigate, analyze, contain and remediate information security events and incidents.
- Providing recommendations on cyber security defensive posture configurations to Senior InfoSec Leadership.
- Influencing and providing technical expertise in a broad range of complex technical and professional functions related to Security Operations.
- Applying data science principles to security events and incidents to identify gaps to facilitate the creation of new and advanced methods of detection.
- Leveraging Security Operations Control (SOC) analytical findings to create actionable threat intelligence to influence changes to the information security posture.
- Working with upper management to recommend and implement changes to the Intelligence and Incident Response program.
Preferred Qualifications
- Master’s Degree Preferred.