Cyber Threat Intelligence Analyst- SIACAre you looking for a career in the information security and criminal justice field The Utah Statewide Information & Analysis Center (SIAC) is an amazing step on your career path. You'll be able to provide assistance to the citizens of Utah and make a difference in our communities.Serve as a Cyber Threat Intelligence Analyst with specialties in strategic intelligence production, technical analysis, cyber threat hunting, and/or cyber outreach coordination. Conduct research regarding threat groups and evaluate intelligence on criminal tactics, techniques, and procedures. Analyze events to determine the impact on current operations and conduct research to determine adversary capability and intent. This may include giving and producing intelligence briefings, training, presentations, and organizing collaborative groups and outreach programs. Conduct outreach to increase security awareness and notification of specific threats. Cyber Threat Intelligence Analysts perform entry level Information Security related duties in the areas of cybersecurity. As a Cyber Threat Intelligence Analyst, you will: -Collect and document raw information for further analysis and evaluation. -Assess and analyze cyber threats and vulnerabilities and disseminate intelligence reports to stakeholders. -Assist law enforcement with network analysis and criminal investigations. -Coordinate and participate in necessary outreach to law enforcement, public and private sector, and cybersecurity professionals. -Perform statistical and intelligence analysis by applying analytical tradecraft and best practices in analyzing data and reaching accurate conclusions. -Analyze, summarize and/or review data; report findings, interpret results and/or make recommendations. -Write or draft raw and finished intelligence reports, articles or related material based on research, investigation or analysis. -Form conclusions and develop recommendations for detection, deterrence, disruption and mitigation. -Participate in community working groups or teams or other related assignments as needed/directed. -Ensure the integrity and protection of networks, systems, and applications through cyber threat and network monitoring, performing on-demand vulnerability assessments, and investigations and reporting of incidents.