Threat Analyst Technical Specialist
Threat Analyst Technical Specialist supports security operations. The professionals must play an active role in the detection of malicious activities. They must have excellent problem-solving skills and be able to perform research and analysis of data and information associated with any threat activity. The technical specialist must also be able to respond to threats and ensure continuous improvement through data analytics.
The specialist is responsible for the development of analytical threat models. They should provide all the necessary functional guidance and direction to threat teams in the overall conduct of projects. They perform work activities under general guidance and direction. The professionals have to encourage the team performing expert-level research and technical analysis of intelligence. They should also look into the issues related to data support of threat studies.
Threat Analyst Technical Specialist must offer advice, guidance and direction to the threat studies team. They should be able to take care of the other technical services such as design, development, installation and other wide-range of systems that support cyber intelligence functions. The professionals must handle any issues related to testing, integration and support. They have to organize and coordinate the technical activities.
Job Description
This Analyst must maintain and secure the enterprise-wide cyber systems and networks, come up with security initiatives that will provide timely and complete resolutions and work with advanced forensic tools and techniques for attack reconstruction. Job duties will include:
- Developing analytical threat models
- Coordinating with the threat study teams and offering all necessary functional guidance to avoid any malicious activities
- Support the team with research and source analysis
- Develop analytical products using enterprise and all-source intelligence
- Conduct malware analysis and provide indicators for defensive measures
- Reverse engineer attacker encoding protocols
- Understand the attack signatures and techniques
- Work in coordination with external entities such as law enforcement, the intelligence community, and other government agencies
- Perform network traffic analysis by using raw packet data, net flow, and IDS as it relates to cyber security and communication networks
- Must develop a custom signature and assess threat data from different sources
- Should take part in the preparation of proposals from the potential customers
- Provide technical assistance to corporate representatives related to proposal development
- Must have an in-depth understanding of the concepts and threat forces
- Good working knowledge of advanced threat analysis technology in subjects such as telecommunications, computer science, and other is an added advantage
- Take charge of the collection methods, production resources and responsibilities
- Should have the necessary skills to take care of the highly classified information
- Responsible for managing the security of enterprise-wide networks
- Offer all the necessary support to cyber security initiative through predictive and reactive analysis
- Must articulate the emerging trends to the co-workers
- Coordinate the resources and provide timely and complete resolutions
Educational Qualifications
The candidates should possess a bachelor’s degree in computer science, information systems, electrical engineering or any related field. Apart from the degrees, some organizations also look for work experience.
Useful Certifications
Candidates with certifications have an added advantage. It is these certifications that will help the professionals to prove their expertise. Some of the certifications organizations may ask for are:
Certified Information Systems Security Professional (CISSP)
The Certified Information Systems Security Professional certification validates the professional skills to plan, design and manages the controls that protect the IT and business systems secure. The certified professionals are leaders in subjects such as mobile device security, application development security, and cryptography.
Security+
The CompTIA Security+ certification emphasizes on trends and techniques in risk management, risk mitigation, threat management and intrusion detection. It offers the candidate hands-on practical skills that will prepare them better to solve a wide variety of issues.
Information Systems Security Engineering Professional (ISSEP)
The Information Systems Security Engineering Professional certification proves the candidate’s skills in designing, creating and implementing security within applications, services and information systems.
Global Information Assurance Certification(GIAC)
Global Information Assurance Certification (GIAC) is a vendor-neutral computer security certification. It is a leading edge technological advancement of IT security to keep ahead of black hat techniques.
Salary
According to Ziprecruiter, the annual salary ranges from $65,500 to $186,500 nationally. The average salary of $121,000 shows that Threat Analyst pay rates are seeing general stability across the country. As per Indeed salary estimate the on an average the Threat Analyst Technical Specialist salary ranges from approximately $53,812 per year for Training Specialist to $55,541 per year for Intelligence Analyst.
Career Opportunities
The need for security professionals with appropriate skill in threat intelligence is growing. Organizations are looking for candidates who can evaluate the raw external and internal intelligence data and forming finished analysis to drive decisions. The professionals with relevant work experience will be able to improve situational awareness for clients based on their requirements.
How Field Engineer Can Help you
Get placed as a freelance Threat Analyst Technical Specialist in the global freelance marketplace through Field Engineer. With more than 40,000 freelance field engineers on board, this platform enables skilled and professional candidates to find jobs tailored to fit their skills and requirements. Sign up today, and get in touch with businesses in search of the right talent.