Current jobs related to Associate Principal Cyber Threat Intelligence Analyst - Washington, Washington, D.C. - Dragos
-
Sr. Cyber Threat Intelligence Analyst
4 days ago
Washington, Washington, D.C., United States cFocus Software Incorporated Full time $120,000 - $180,000 per yearcFocus Software seeks a Senior Cyber Threat Intelligence Analyst to join our program supporting AOUSC. This position is fully remote. This position requires active Public Trust clearance.Qualifications:8 years' experience in conducting in-depth analysis of cyber threats, including malware, phishing campaigns, and other attack vectors. This involves...
-
Cyber Threat Intelligence Analyst
2 days ago
Washington, Washington, D.C., United States Tyto Athene, LLC Full time $80,000 - $120,000 per yearTyto Athene is searching for a Cyber Threat Intelligence Analyst to support multiple cybersecurity workstreams within the Department of Health and Human Services (HHS). The individual will contribute to research, analysis, and operational support activities as part of HHS's Cybersecurity Operations (CSO) division. The role is instrumental in assisting with...
-
Associate Analyst, Cyber Threat Intelligence
2 days ago
Washington, Washington, D.C., United States Sony Full time $85,000 - $105,000Sony Corporation of America, located in New York, NY, is the U.S. headquarters of Sony Group Corporation, based in Tokyo, Japan. Sony's principal U.S. businesses include Sony Electronics Inc., Sony Interactive Entertainment LLC, Sony Music Entertainment, Sony Music Publishing and Sony Pictures Entertainment Inc. With some 900 million Sony devices in hands...
-
Senior Cyber Threat Intelligence Analyst
4 days ago
Washington, Washington, D.C., United States Valiant Solutions Full time $135,000 - $149,000 per yearPosition DescriptionValiant Solutions is seeking aSenior Cyber Threat Intelligence Analystto join our rapidly growing and innovative cybersecurity teamNamed one of theBest Places to Work in the Washington DC area for 11 consecutive years, Valiant is proud of our employee-centric culture and commitment to excellence. If you are interested in learning more...
-
Senior Threat Intelligence Analyst, SEAR
4 days ago
Washington, Washington, D.C., United States Apple Full time $120,000 - $180,000 per yearAs part of our efforts to protect our users, Apple is looking for a world-class senior threat intelligence analyst to join a team of security researchers and threat intelligence analysts. This team works together and cross-functionally to drive efforts to solve security engineering challenges, with an emphasis on supporting decisions that provide the...
-
Lead Cyber Threat Analyst
2 days ago
Washington, Washington, D.C., United States DirectViz Solutions, LLC Full time $120,000 - $180,000 per yearDirectViz Solutions, (DVS) is a rapidly growing government contractor that provides strategic services that meet mission IT needs for government customers. DVS provides innovative information technology solutions to government clients through the knowledge and expertise of our dedicated employees. DVS is an employee-centric employer that provides competitive...
-
Cyber Insider Threat Analyst
5 hours ago
Washington, Washington, D.C., United States Raytheon Full time $82,000 - $164,000 per yearDate Posted: Country:United States of AmericaLocation:UTDC1: UT-DC-Remote UT Remote DC , Washington, DC, 20024 USAPosition Role Type:RemoteU.S. Citizen, U.S. Person, or Immigration Status Requirements:U.S. citizenship is required, as only U.S. citizens are authorized to access information under this program/contract.Security Clearance:None/Not RequiredRTX...
-
Threat Analyst
4 days ago
Washington, Washington, D.C., United States Dentons Full time $83,850 - $111,850Dentons US LLP is currently recruiting for a Threat Analyst. The Information Security Threat Analyst is responsible for proactively hunting for threats within client environments, developing and tuning SIEM use cases, and conducting in-depth investigations of security events. The role involves monitoring and operationalizing threat intelligence,...
-
Cyber Intelligence Vice President
3 days ago
Washington, Washington, D.C., United States JPMorgan Chase Full time $120,000 - $250,000 per yearHarness your expertise to shape robust cybersecurity strategies and safeguard critical assets. Your leadership will be pivotal in enhancing our resilience against evolving global cyber threats.As the Cybersecurity Intelligence Vice President at JPMorgan Chase within the Cybersecurity and Tech Controls team, you will play a critical role in safeguarding the...
-
Managing Director, Threat Intelligence
51 minutes ago
Washington, Washington, D.C., United States Kroll Full time $120,000 - $250,000 per yearManaging Director, Cyber and Data ResilienceWe are seeking a Managing Director to lead our Cyber Threat Intelligence (CTI) offering, within our Cyber and Data Resilience service line. This role involves driving strategy, overseeing delivery, leading client engagements, and growing a world-class CTI team. You will work with Fortune 500 companies and public...
Associate Principal Cyber Threat Intelligence Analyst
2 weeks ago
Dragos is on a relentless mission to defend industrial organizations that provide us with the necessities of modern civilization; running water, functioning electricity, and safe industrial working environments. As the market leader in ICS/OT Cybersecurity, we are dedicated to arming our customers with best-in-class technology, threat intelligence, and services to protect their systems as effectively and efficiently as possible. We're a remote-first culture with operations in North America, Europe, the Middle East, and APAC. We're looking for mission-oriented teammates who embody our core values of authenticity, transparency, and trust. Are you ready to make a difference? Come join a mission that can save the world
About the Role:
The Dragos Global Intelligence team is seeking a Senior Cyber Threat Intelligence Analyst to partner directly with our government customers, embedding within their security and intelligence teams to deliver highly tailored, actionable intelligence. This role involves a range of delivery formats—written reports, verbal briefings, in-person sessions, and both long-form and rapid-turnaround responses—based on customer needs. The analyst will also collaborate closely with internal delivery teams to ensure engagements generate the greatest possible intelligence value. The ideal candidate brings experience supporting customers in a service-driven environment, delivering customized cyber threat intelligence. Familiarity with industrial control systems (ICS) and prior involvement in incident response are also key to success in this role. This is an onsite position (5 days per week) that will report to a customer office in Washington DC.
Responsibilities:
- Directly support clients with their respective ICS/OT security and cyber threat intelligence needs through proactive threat hunting across ICS/OT environments to identify malicious activity, anomalous behavior, and indicators of compromise.
- Collaborate with customer's internal security teams to validate findings and escalate confirmed threats.
- Support the customer's ICS/OT cyber security operationalization using the Dragos Platform.
- Leverage multiple OT CTI sources to respond to client inquiries and draft recurring deliverables tailored to your respective client's priority intelligence requirements.
- Build and maintain a working knowledge and understanding of ICS/OT threats and risks directly relevant to your respective client's OT environment, including attack surface analysis, threat hunting strategies, and threat modeling.
- Translate technical intelligence into operational recommendations for OT defenders and stakeholders.
- Maintain awareness of global threats to ICS/OT systems.
- Provide support and feedback to other internal Dragos teams, such as Customer Success and the broader Dragos Intelligence apparatus.
- Report to the client's respective facility during core operational hours.
Requirements:
- Must be willing to commute 5 days per week to a customer office in Washington DC.
- Active Top Secret Security Clearance.
- Minimum of 4 years in CTI hunting and analysis, with hands-on experience in threat hunting, research and analysis using tools and data such as NetFlow, endpoints, OSINT and incident response/forensics.
- Minimum of 2 years in a customer-facing role (e.g., consulting or managed service provider)
- Minimum of 2 years working with ICS/OT environments, including knowledge of relevant technologies, network topology, protocols and how adversaries target and exploit them.
Preferred Experience:
- Experience with network and host-based security platforms
- Experience with performing threat hunts within an OT environment as well as writing CTI analysis products and deliverables using confidence-based assessments.
- Knowledge of CTI threats impacting one or more industry verticals or sectors (i.e., Oil & Natural Gas, Electric, Government, Chemicals, Manufacturing, Water, and so on).
- Knowledge of ICS adversary TTPs, historical attacks, and the overall impact of those events.
- Understanding of ICS/OT technology and how adversaries can exploit that technology.
- Knowledge of cyber security and network defender frameworks such as Mitre ATT&CK and DEFEND.
- Experience with ICS/OT network topology, standard ICS protocols, and common technologies such as PLCs, HMIs, RTUs, and EDSs.
- Experience with data aggregation, hunting, and analysis tools such as Synapse.
Compensation:
- Salary: $155,000
- Competitive Equity Package
- Comprehensive Benefits Plan
#LI-JF1 #LI-REMOTE
Dragos is an Equal Opportunity Employer and considers applicants for employment without regard to race, color, religion, sex, orientation, national origin, age, disability, genetics, or any other basis forbidden under federal, state, or local laws. All new hires must pass a background check as a condition of employment.