Skip to content

Cyber Analyst
Company | Shift5 |
---|
Location | San Antonio, TX, USA |
---|
Salary | $120000 – $160000 |
---|
Type | Full-Time |
---|
Degrees | |
---|
Experience Level | Junior, Mid Level |
---|
Requirements
- Demonstrated expertise in data analytics using tools similar to Databricks
- Familiarity with vulnerability research or reverse engineering of embedded systems, RF protocols, Operational Technology (OT) systems or weapons systems
- Proficiency in working with and analyzing large data sets
- Ability to develop technical processes and experience integrating API-based commercial software products
- Ability to engage with customers, understand their requirements, and tailor solutions (including building and offering formal and informal training) accordingly
- Astute written and verbal communication skills, with the ability to consistently and cogently address our customers’ needs
- Familiarity with common cyber, IT, and OT frameworks (e.g., MITRE ATTACK, Perdue Model, OSI Model) and adaptability to new use cases
- Capability to capture and translate patterns into alerts and detection methodologies
- Experience in creating and delivering executive briefings and updates
- Ability to thrive in a team-oriented culture, delivering a significant individual contribution while collaborating with and strengthening teammates
- Must be able to work with remotely distributed teams and should expect up to 30% travel to attend customer on-site visits, internal team travel, and one-off events
- US Citizenship with an active (or ability to hold/obtain) US Government Top Secret security clearance
Responsibilities
- Dive deep into the inner workings of weapon systems, mastering their architecture and communication pathways
- Become fluent in the language of cyber threats, using frameworks like MITRE ATT&CK to identify and analyze vulnerabilities
- Decipher complex technical documentation, extracting critical insights to fuel your data analysis
- Leverage your expertise in real-time embedded systems to understand system behavior and predict potential attack vectors
- Unlock the secrets of wireless communication protocols, including GPS, Link16, and SATCOM, to safeguard critical systems
- Experience wrangling and interpreting RF and OT protocol datasets
- Analyze aircraft data to identify patterns indicative of cyber threats
- Develop and implement anomaly detection rules and signatures
- Conduct root cause analysis of anomalous behavior, faults, and maintenance defects
- Prepare comprehensive reports summarizing findings, methodologies, and recommendations
- Share knowledge / document formal and informal training around expertise in cyberdata analysis and interpretation with military and civilian customer personnel
Preferred Qualifications
No preferred qualifications provided.