Overview
On Site
Full Time
Skills
Fusion
Operations
Physical security
Writing
Trend analysis
Research
Collaboration
Cyber security
Law enforcement
Data
Forensics
Information security
HR management
Payroll
Payments
Software development
Financial services
Incident management
Artificial intelligence
Machine Learning (ML)
Supply chain management
Malware analysis
Critical thinking
Analytical skill
Threat analysis
Open source
Job Details
About the Team:
We are looking for a highly skilled Senior All-Source Intelligence Analyst to join our Cyber Defense Fusion Center's Intelligence Operations team. Our mission is to provide decision-makers with intelligence-driven insights to enhance both the technical and physical security of our environments. The ideal candidate will be adept at analyzing significant current events, threat actors, campaigns, and TTPs (tactics, techniques, and procedures) in both physical and cyber domains. This role involves synthesizing information, identifying patterns, and assessing impacts on our enterprise. Responsibilities include collecting and centralizing relevant intelligence sources, developing and disseminating threat intelligence, and engaging with cross-functional teams to support UKG's critical business needs. The candidate must possess strong analytical and critical thinking skills, experience in applying structured analytic techniques, and excellent writing and briefing abilities.
About the Role:
Responsibilities:
Gather TTPs (Tactics, Techniques, and Procedures) of malicious actors targeting our industry and partners.
Research and collect IOCs (Indicators of Compromise) related to malware targeting core infrastructure.
Investigate and track vulnerability exploits/proof of concepts, collaborating internally to mitigate risks.
Discover, validate, and integrate new sources of threat information into existing intelligence processes.
Collaborate with internal security teams to gather requirements and discuss findings.
Produce analysis using all-source tools to identify characteristics of threat actors targeting the company.
Identify and illuminate adversary behavior to disrupt, degrade, and interrupt malicious activity.
Conduct trend analysis based on research of events and correlation to real-world attacks.
Develop tactical threat intelligence packages to support Threat Hunters against specific TTPs and behaviors.
Collaborate with the Incident Response team to support security investigations.
About You:
Basic Qualifications:
Education: Bachelor's Degree or equivalent of four (4) years of professional experience.
Experience: 3-5 years of relevant analytic experience in Intelligence, Cybersecurity, Investigations, Law Enforcement, Data Forensics, or Information Security fields.
Detailed understanding of global cyber threats, threat actors, and TTPs (Tactics, Techniques, and Procedures) used by cyber adversaries.
Specific knowledge related to HCM, payroll payments/processing, software development, or financial services industries.
Preferred Qualifications:
Knowledge of the Incident Response process and the MITRE ATT&CK framework.
Deep knowledge in one or more of the following threat categories:
? Regional Threat Groups, Emerging Technology (AI, ML, Quantum), Supply Chain Threats, Mobile Targeting Malware, Regulatory impacts to the threatscape
Expertise with a range of threat intelligence tools and open-source intelligence resources/techniques
Deep understanding and application of critical thinking and structured analytic techniques.
Expertise with a range of threat intelligence tools and open-source intelligence resources/techniques.
Experience working across organizational boundaries to assess cyber threats to infrastructure and services.
Ability to build relationships across the company and with external networks.
Experience leveraging information-sharing communities, professional consortia, or personal networks to fill intelligence gaps.
We are looking for a highly skilled Senior All-Source Intelligence Analyst to join our Cyber Defense Fusion Center's Intelligence Operations team. Our mission is to provide decision-makers with intelligence-driven insights to enhance both the technical and physical security of our environments. The ideal candidate will be adept at analyzing significant current events, threat actors, campaigns, and TTPs (tactics, techniques, and procedures) in both physical and cyber domains. This role involves synthesizing information, identifying patterns, and assessing impacts on our enterprise. Responsibilities include collecting and centralizing relevant intelligence sources, developing and disseminating threat intelligence, and engaging with cross-functional teams to support UKG's critical business needs. The candidate must possess strong analytical and critical thinking skills, experience in applying structured analytic techniques, and excellent writing and briefing abilities.
About the Role:
Responsibilities:
Gather TTPs (Tactics, Techniques, and Procedures) of malicious actors targeting our industry and partners.
Research and collect IOCs (Indicators of Compromise) related to malware targeting core infrastructure.
Investigate and track vulnerability exploits/proof of concepts, collaborating internally to mitigate risks.
Discover, validate, and integrate new sources of threat information into existing intelligence processes.
Collaborate with internal security teams to gather requirements and discuss findings.
Produce analysis using all-source tools to identify characteristics of threat actors targeting the company.
Identify and illuminate adversary behavior to disrupt, degrade, and interrupt malicious activity.
Conduct trend analysis based on research of events and correlation to real-world attacks.
Develop tactical threat intelligence packages to support Threat Hunters against specific TTPs and behaviors.
Collaborate with the Incident Response team to support security investigations.
About You:
Basic Qualifications:
Education: Bachelor's Degree or equivalent of four (4) years of professional experience.
Experience: 3-5 years of relevant analytic experience in Intelligence, Cybersecurity, Investigations, Law Enforcement, Data Forensics, or Information Security fields.
Detailed understanding of global cyber threats, threat actors, and TTPs (Tactics, Techniques, and Procedures) used by cyber adversaries.
Specific knowledge related to HCM, payroll payments/processing, software development, or financial services industries.
Preferred Qualifications:
Knowledge of the Incident Response process and the MITRE ATT&CK framework.
Deep knowledge in one or more of the following threat categories:
? Regional Threat Groups, Emerging Technology (AI, ML, Quantum), Supply Chain Threats, Mobile Targeting Malware, Regulatory impacts to the threatscape
Expertise with a range of threat intelligence tools and open-source intelligence resources/techniques
Deep understanding and application of critical thinking and structured analytic techniques.
Expertise with a range of threat intelligence tools and open-source intelligence resources/techniques.
Experience working across organizational boundaries to assess cyber threats to infrastructure and services.
Ability to build relationships across the company and with external networks.
Experience leveraging information-sharing communities, professional consortia, or personal networks to fill intelligence gaps.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.