However, for career advancement, you can join our Certified Threat Intelligence Analyst (CTIA) program. We ranked the top skills based on the percentage of Cyber Security Analyst resumes they appeared on. Performed technical network analysis in the functional areas of Cyberspace Operations. Provided internal information security awareness training. In this threat analysis training and credential program, you will gain real-world practical knowledge, and 40% will be a hands-on lab session. Participated in IT projects by providing IT Security support architecture, and process/procedure/technical support. Directed development of SQL database driven data parsing tool for reporting and implementation of SharePoint sites for collaboration. Enhanced nationwide INFOSEC knowledge and awareness by drafting instructions that guided 50,000 users in accurate adherence to DOD Cyber Security regulations. Used device logs to track network security incidents. Provided the Security Authorization Package (SAP) to the office of CISO for risk acceptance and issuance of ATO recommendation. Identified and evaluated potential threats vulnerabilities and generating investigative reports to present to the senior management. It can be very hard for working professionals to gain all of the skills that are listed above. Provided training on Intrusion Detection System/Intrusion Prevention System, penetration testing using Wireshark. Scanned for network vulnerabilities using Nmap and Wireshark for analysis and false positive analysis. Reviewed/Edited Cyber Security Documentation required for ATO (Authorization to Operate) in compliance with NIST RMF process. Verified and coordinated investigation of security incidents with analyst and production teams. Supported information assurance asset deployments, upgrades, and maintenance. Resulted in greatly improving the network security and protecting Entergy from Cyber terrorism. Performed threat analysis, threat forecasts and threat alerts, and recommends countermeasures. Conducted gap analysis to make sure correct controls were in POA&M. Performed documentation support for security engineers and analysts, on developments of System Security Plans, Contingency Plans and Risk Assessments. Troubleshot points of failure from packet origination to destination. This should also include the threat intelligence tools, statistical data analysis tools, threat modeling tools and methodologies, threat sharing platforms, and malware analysis tools. Performed liaison functions to increase information sharing and joint efforts across the Law Enforcement and Intelligence Communities. Certified in accordance with DODD 8570.1. Performed cyber threat analysis and reporting by leveraging internal and external intelligence sources. Performed first line support for NIDS and HIDS network sensors service interruptions. Updated Plan of Action & Milestones (POA&M) and Risk Assessment based on findings assessed through monthly updates. Delivered training to base administrations Information Assurance Officers and surrogates in the development and maintenance of their INFOSEC programs. Collaborated on the 2014 project that included the installation, configuration, testing, and deployment of the Enterprise DLP Suite. Involved in the preparation of Disaster Preparedness guidance and documentation. Studied network security, compliance/operation security, threats and vulnerabilities, and application, data and host security. Developed organizational information system security requirements. Implemented end user security awareness training programs, testing the knowledge of security compliance in relation to areas of information technology. Generated HTML evidence report consolidating a variety of investigative findings for multiple mobile devices. Researched Data Diode and Firewall boundary levels and defensive strategies. Designed and conducted the Information Technology Contingency Plan full-scale functional exercise program, incorporating the Homeland Security Exercise Evaluation Program. Administered secure Internet access solution for bank; converted / delivered single solution integrated with new infrastructure. Supported security compliance activities including Plan of Action and Milestones Procedure (POA&M) management, and IFS audits. Performed SQL Server administration activities. Demonstrated effectiveness of security controls Conduct vendor analysis, comparison and deliver proof of concept projects for all potential applications purchase. Designed and implemented a plan to upgrade the ACAS infrastructure to include MDA's remote sites. Created and implemented workflow and QA process used by SOC. A threat intelligence analyst needs to know of the various ways to gather data. Performed other network security and information assurance duties as assigned. Created custom network based signatures to improve defensive posture within NIDS and SIEM. This is why an organization needs to have a cyber threat intelligence analyst. Provided network security consulting services to U.S. military customers. Performed quality assurance reviews of A&A artifacts and identify discrepancies in work. Analyzed detailed security requirements, recommended courses of action to the Information Assurance Manager (IAM) and System/Network Administrators. Monitored the data loss prevention (DLP) system for improper network communication involving PII. Prepared and briefed daily activity reports to Army leadership regarding situational awareness of Army network and systems and cyber threats. Provided metrics to Quality Assurance Team Lead from completed projects. Transferred from the Pentagon to fill as technical lead for the IDS team. Performed time-critical troubleshooting using TCP/IP knowledge to diagnose and identify common network issues from attacks. Served as the DoD liaison officer at the DHS / FEMA National Operations Center on an as needed basis. Created SOPs for handling incidents through its lifecycle, in order for the SOC to be in compliance for security requirements. Analyzed current threats to information security and systems. Collaborated with the Chief Information Security Officer (CISO) to effectively manage the enterprise information security program at CFA Institute. Strengthened security posture utilizing the Risk Management Framework and supported the overall security program by implementing policies and procedures. This is because there are multiple ways of collecting data such as search engines, website footprinting, web services, automated OSINT tools, DNS interrogation, and others. Analyzed intrusion alerts in Sourcefire, RSA Security Analytics, QRadar, and Splunk. Conducted Security Assessment on the Technical Controls to ensure Compliance. Supervised defense of global Air Force cyberspace network-Performed cyber systems vulnerability assessments and penetrationtesting. Some of the ways cyber threat intelligence analysts carry out their threat analysis are through Statistical Data Analysis, Analysis of Competing Hypotheses (ACH), Threat Modeling, Fine-Tuning Threat Analysis, Creating Runbooks and Knowledge Base, etc.