Remote Cyber Work

Post a Job


Technical Intelligence Analyst (Remote)


Technical Intelligence Analyst (Remote)


Company Description

FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. Learn more about FireEye's world-class solutions and global footprint at
Job Description

In this role, Technical Intelligence Analysts are responsible for interfacing directly with customers to field a variety of intelligence questions, providing the customer a first-class experience by delivering timely, actionable, clear, and concise intelligence. 

The ideal candidate will possess a background in Information Security and the intelligence process, ideally gained in a global corporation.  He/she will apply analytical rigor to all work while remaining open to non-traditional information or conclusions.  The analyst will have excellent writing and presentation skills and be able to defend his/her analytical conclusions in logical and persuasive terms. The analyst will have experience analyzing malicious code, associated infrastructure, and other relevant artifacts to help provide context for their analytical efforts. The senior analyst will also help to provide analytical oversight for the rest of the team, reviewing reports and other client communications to ensure that all expectations of analytic rigor and technical accuracy are met. The senior analyst will also be able to work independently to meet tight deadlines. 


  • Provide cogent cyber threat intelligence analysis to enterprise clients and various internal teams in written and oral form
  • Ensure customer satisfaction through timely dialogue, both written and spoken
  • Create custom analytic products based on conclusions and judgments derived from large quantities of FireEye iSIGHT Intelligence data sources and independent research
  • Provide timely support for clients’ incident response, hunting, threat intelligence teams by collecting relevant intelligence and/or performing unique research and providing analysis
  • Perform technical analysis on malicious or suspicious artifacts (malicious executables and documents, packet captures, etc)
  • Work closely with the other FireEye iSIGHT Intelligence teams to update and improve intelligence products and collection processes
  • Track customer requests from start to finish and engage with customers directly as required
  • Provide some level of off-hours support for customer requests on a rotating basis
  • Provide targeting analysis in support of all source collection activities
  • Use knowledge, creativity, critical thinking, and analytic tradecraft best practices to obtain solutions to complex problems where analysis of situations or data requires an evaluation of intangible variables under conditions of uncertainty
  • Participate in trend / correlation analysis and scenario forecasting at both the tactical and strategic level
  • Ensure timely response to all suspense deadlines and administrative actions
  • Maintain confidentiality and ethics within the framework of the engagement

  • An engaging personality supported by an inquisitive, analytical mind
  • Strong communication skills with clear and concise writing; able to build a compelling and effective narrative.
  • Ability to work in fast-paced environment, to triage and to work within a small, highly-technical group while providing explanations to non-technical people
  • Ability to work as part of a distributed virtual analysis team with limited supervision
  • 5 + years’ experience in Information Security, gained in a hands-on technical or intelligence role
  • History of participation in industry or technology information sharing groups, formal or informal
  • Ability to dynamically analyze malicious code and related threats
  • Understanding of how operating systems work and the ways malware interacts with them
  • Understanding of common network traffic protocols and familiarity with common network traffic analysis techniques
  • Past exposure to a variety of malware families used by Espionage or Criminal campaigns
  • Significant experience with the following concepts and related tool sets:
    • Network sniffers
    • Process analysis tools
    • Registry analysis tools
    • File analysis tools
    • Memory analysis tools

  • Experience working in a large enterprise environment
  • Practical experience as an intelligence analyst
  • Ability to perform dynamic and static code analysis
  • 3+ years experience working with malware or exploits, or engaged in either threat research or incident handling
  • Strong working knowledge of Linux or Unix operating systems
  • Experience with vulnerability management, penetration testing, scripting, programming, reverse engineering and similar job experience
  • Experience with scripting or programming languages, notably VB, C++, Perl or Python
Education, Certifications, Etc.:

  • Undergraduate degree in cyber security, computer science, intelligence studies, criminal justice, journalism, or equivalent experience
  • Preferred certifications: GIAC Reverse Engineering Malware (GREM), GIAC Certified Incident Handler (GCIH) or GIAC Certified Forensics Analyst (GCFA)