Sr Staff Cyber Intelligence Analyst

General Electric
  • Location
    Glen Allen, Virginia
  • Sector
  • Experience
    Mid Career
  • Posted
    Jan 29

Position description

The Sr Staff Cyber Intelligence Analyst will be focused on the collection of timely and accurate Intel from a diverse range of information sources. The ideal candidate will possess hands-on expertise with the latest technologies, procedures and processes for acquiring intelligence and have practical experience processing, analyzing and disseminating information. The Analyst must be able to think on their feet and deal with a wide range of intelligence correlation. Essential Responsibilities: 

In this role, you will:

  • Monitor a wide array of diverse information sources - ranging from open-source to classified materials - for potential threats to GE’s personnel, infrastructure and operations
  • Focus on the protection of information systems assets, corporate information and intellectual property assets in order to prevent the intentional or inadvertent access, modification, disclosure, or destruction of those assets
  • Research relevant intelligence feeds and contextualize findings to GE’s specific business risks
  • Work independently when necessary and be self-directed when appropriate
  • Provide expertise and counsel to management, other organizations and special projects personnel
  • Collaborate with management in developing risk mitigation techniques, setting objectives and setting realistic and challenging goals
  • Mentor fellow employees on the intel cycle, analytical writing, and quantitative thinking


Basic Qualifications:

  • Bachelor's Degree in Computer Science or “STEM” Majors (Science, Technology, Engineering and Math). A minimum 8 years of professional experience in STEM or Political Science/Government/International Affairs-related profession .

    Eligibility Requirements: 

  • Legal authorization to work in the U.S. is required. We will not sponsor individuals for employment visas, now or in the future, for this job 

Desired Characteristics: 

  • An understanding of APT, Cyber Crime, and associated tactics
  • Experience in intelligence enrichment practices (PassiveDNS, Domain Registration pivoting, VirusTotal, etc.)
  • Experience in actor tracking and IOC processing
  • Experience with data analysis tools - Splunk, Analyst Notebook (social network analysis), SIsense (business intelligence), and collaborative analytics tools
  • Familiarity with scripting / programming (Python preferred)
  • Experience with detection rule writing (Suricata, Snort, Yara, etc.)
  • Familiar with CND-based analytical models (Kill Chain, Pyramid of Pain, ATT&CK, etc.)
  • Ability to set and manage expectations with key stakeholders and team members
  • Strong ability to prioritize and execute with minimal direction or oversight
  • Exceptional critical thinking, writing, and presentation skills that properly qualify assessments with concise, relevant, and accurate communications
  • Proven track record of successfully managing and executing on short term and long term projects and the ability to establish rapport with various roles (executive management to deeply technical)
  • Desired background working in government intelligence or cyber intelligence
  • An understanding of APT (nation states), Cyber Crime, Hacktivism and other associated actors
  • CISSP, CISM or related SANs certifications, or relevant technical experience preferred
  • Foundational cyber skills: Networking (TCP/IP, UDP, Routing); Applications (HTTP, SMTP, DNS, FTP, SSH,etc..); Encryption (DES, AES, RSA) and hashing algorithms (MD5, SHA-1, etc.); System/Application vulnerabilities and exploitation; Operating systems (Windows, *Nix, and Mac)Cloud technology (SaaS, IaaS, PaaS), and malware or behaviors exploiting these systems

Application instructions

Please be sure to indicate that you saw this position on

follow us on Twitter