Washington, District of Columbia, USA
1 day ago
Expert Cyber Defense Threat Analyst - TS/SCI with Polygraph

How A Cyber Defense Threat Analyst Will Make an Impact 

The successful applicant should be expected to identify potential cyber threats, determine levels of risk, and produce analytical reports for a variety of audiences. You will occasionally be required to present your findings in front of senior executives, so the ability to translate technical indicators into layperson’s terms is vital.  

Outstanding problem-solving skills are essential. When serious threats are identified, you will work closely with other areas of the security team to identify appropriate solutions. You must be passionate about technology, and able to learn the ropes of new security solutions rapidly.  

Indicators of Compromise (IOC)s will be obtained through: forensic analysis of digital information, Open-Source Intel (OSINT) review/monitoring, available tools both customer provided and open source, and pivoting/researching on previously reported IOCs. Recommending adjustment of countermeasures, enterprise or tactical, to account for threats.  

Discovering adversary campaigns, anomalies and inconsistencies in sensor and system logs, SIEMs, and other data; investigate to identify or rule out system compromises, provide written analytic summaries and attack life cycle visualizations.  

Participate in collaborative sessions with other CNDSPs and IC agencies and cross functional (Current Operations, Future Operations, Logistics, Planning, Resourcing and Requirements) on malicious intrusions, attacks or suspicious activities, as well as share emerging Cyber Threat Intel data to achieve centrally coordinated, threat informed and prioritized vulnerability scoring and mitigation methodology.   

Analyzing and documenting malicious cyber actors TTPs, providing recommendations and alignment to vulnerabilities and applicability to the enterprise operational environment. Assists in the development of IOCs for active defensive countermeasures and passive detection signatures.  

Providing risk assessments and recommendations based on analysis of technologies, threats, intelligence, and vulnerabilities.  

Recommending adjustment of prioritized enterprise focused analysis based on immediate threat identified based on intelligence and other analysis performed.  

Collecting analysis metrics and trending data, identify key trends, and provide situational awareness on these trends.  

Good written communications skills are necessary to properly document and report the identification and sharing of newly identified IOCs.  

Attention to detail and ability to work with team-members and independently. 

What You’ll Need to Succeed: 

Bachelor's Degree and 10+ years of relevant experience, equivalent combinations of education, certifications, and experience will be considered.  

DoD Approved Baseline 8570 IAT level II (Sec+, CySA+, CND, etc.) certification is required prior to start date.

DoD Approved Baseline 8570 CSSP Analyst (CEH, CySA+, CND, Cloud+, etc.) certification is required prior to start date.

GIAC Cyber Threat Intelligence (GCTI) or equivalent (other GIAC certs or any cert under 8570 CSSP Analyst) certification is required within first 120 days of employment.

Security Clearance Level: TS/SCI clearance and ability to obtain and maintain a CI Polygraph 

 
Required Skills and Abilities: 

Must have knowledge of standard network infrastructure. 

Knowledge of masquerading, certificates, and file hashing. 

Familiar with monitoring emerging threats through Tools, Techniques, and Procedures (TTPs) and how they relate to the MITRE ATT&CK framework 

Ability to pivot on indicators 

Location: On Customer Site 

Reston, VA 

Bolling, AFB (DC) 

Confirm your E-mail: Send Email