Cyber Threat Intelligence Analyst II - TX,US - Rackspace

Job Description

Responsible for ensuring that Rackspace identifies and assesses threats to its network and data, monitors its network for malicious activity, investigates intrusions and other relevant events, and has a sophisticated and detailed understanding of the evolving threat landscape.


Strong attention to detail. Strong verbal and written communication skills. Strong analytical and problem solving skills. Practical experience with Linux and Windows operating systems. Familiarity with common programming or scripting languages. Working knowledge of log, network, and system forensic investigation techniques. Working knowledge of diverse operating systems, networking protocols, and systems administration. Working knowledge of common indicators of compromise and of methods for detecting these incidents. Working knowledge of TCP/IP Networking and knowledge of the OSI model. Working knowledge of OS management and Network Devices. Working knowledge of Intrusion Detection/Prevention Systems. Practical experience monitoring threats via a SIEM console. Practical experience identifying indicators of compromise and of methods for detecting these incidents. Practical experience analyzing threat intelligence sources and determining their applicability to the organization, determining mitigation and compensating controls and applying these to the tooling. Practical experience with Intrusion Detection/Prevention Systems. Practical experience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs, or intrusion prevention logs. Excellent problem solving, critical thinking, and analytical skills - ability to de-construct problems. Experience with packet analysis (Wireshark) and malware analysis preferred.

Job Complexity
  • Provides significant contributions assessing and disseminating threats related to the enterprise in regards to current vulnerabilities by updating the existing threat information/model.
  • Keeps up-to-date knowledge of new and emerging threats that can affect the organization's information assets through OSINT and commercial research and documents these findings in briefings which are presented to leadership.
  • Reviews other team members threat intelligence documentation and provides feedback and opportunities for enrichment.
  • Documents threat intelligence research and observations in tickets and written artifacts, identifies mitigating/ compensating controls, and applies detection sets to the tooling.
  • Conducts analysis using a variety of tools and data sets to identify indicators of malicious activity on the network.
  • Respond to computer security incidents and conduct threat analysis as directed. Provide accurate and priority driven analysis on cyber activity/threats.
  • Perform payload analysis of packets.
  • Detonate malware to assist with threat research.
  • Conducts analysis using a variety of tools and data sets to identify indicators of malicious activity on the network.
  • Provides input to assist with implementation of counter-measures or mitigating controls.
  • Collaborates with incident response analysts to provide indications and warnings, and contributes to predictive analysis of malicious activity.
  • Participate in root cause analysis or lessons learned sessions.
  • Write technical articles for knowledge sharing.
  • Monitor threat actors and related threat objects for items of interest to Rackspace and keep information up to date.
  • Work with the ISOC teams to emulate attacker activity.
  • Deploys new rules and rule sets as released by the vendors and works with the ISOC teams to implement applicable Indicators of Compromise (IOCs) into tooling.
Minimum Qualifications
  • Bachelor’s degree in Computer Science or related field required. At the manager’s discretion, additional relevant experience may substitute for the degree requirement.
  • Typically requires 2-4 year’s experience performing threat research and implementation of rules and IOCs into tooling.
  • Experience applying ethical hacker techniques, phishing schemes, evaluating emerging logical security threats, and compromised server techniques preferred.
  • Current GCIA and related certifications preferred.
Previous article Cyber Security Engineer - IL, US - Impact Networking
Next article Cyber Threat Intelligence Analyst - CA, US - Red Sky Consulting