1-3 years of experience
Concerned about your lack of experience? Learn More...
Employment Type:
Full time
Job Category:
See more jobs for students and recent grads who studied:
Cyber Threat Intelligence Engineer
Tell Us More About Your Job Preferences
By telling us what you think of this job, we can help find jobs that match your interests. If you want to see more jobs like this, click on the smiley face. Or if this job isn't what you are looking for, click the frowny face. Learn More...

Follow This Company

Job Description

Cyber Threat Intelligence Engineer

Chicago, IL

Prestigious Fortune 500 Company is looking for a Cyber Threat Intelligence Engineer. The Cyber Threat Intelligence Analyst will collect, research, coordinate, and deliver intelligence gathered from various sources to increase Company's cyber threat awareness and protection levels. By providing awareness, indications, and warnings, this position will protect Company's global technology infrastructure, business operations, and brand against cyber threats worldwide. The candidate is intimately familiar with standard intelligence analysis practices and has experience leveraging these disciplines in the information security arenas. This is a position for a self-motivated and detailed oriented candidate.

Job Function:

Develop and use standard operating procedures which use cyber security and threat intelligence to enhance enterprise security posture.

Research cyber threats and develop digests of available information for communication to internal teams and management.

Analyze log data from various systems to correlate intelligence information with network behavior.

Develop and implement security countermeasures based on threat research.


3+ years of experience in cyber security
2+ years experience as an analyst, targeter, or collection management officer
Formal training and experience in intelligence analysis or targeting/collections management
Experience formulating and prioritizing intelligence requirements according to an organization's risk management framework
Experience producing finished analytic products
Ability to integrate outputs of technical research, eg, network forensics and reverse engineering, into intelligence products
Experience providing ad hoc analytic in support of incident handling and investigative activities
Experience using commercial and open source cyber threat information to support intelligence analysis
Ability to utilize tools for sifting through and visualizing large technical data sets
Ability to craft intelligence collection requirements that can be satisfied through technical and human collection methodologies
Strong understanding of cyber threat analysis models such as kill chain, diamond model, etc and how they apply to both targeted and non-targeted cyber threats


Applicants must be eligible to work in the specified location

This company profile was created by AfterCollege and is about Request Technology - Anthony Honquest. This page is not endorsed by or affiliated with Request Technology - Anthony Honquest. For questions regarding company profiles, please email: care@aftercollege.com.