Please scroll down, To apply

Tier 3 Cyber Threat Intelligence Analyst with Security Clearance

hiring now
New job

Base One Technologies

2024-11-05 10:40:08

Job location Washington, District of Columbia, United States

Job type: fulltime

Job industry: I.T. & Communications

Job description

Our DC Metro based client is looking for a Tier 3 Cyber Threat Intelligence Analyst. All applicants must be US CITIZENS W/Active TS clearance. Shift: Regular Day shift Basic Qualification:
The candidate should have a minimum of 5 years of experience cyber security analyst performing intelligence analysis, collection management, and technical analysis. They should also have substantial experience in identifying, tracking, and investigating high priority threat campaigns, malicious actors with the interest, capability and TTPs (Techniques, Tactics and Procedures). The candidate should also have experience with or possess deep knowledge of:
o 2+ years with host-based and network-based security monitoring solutions and to include security content recommendation or development (host based and network signatures)
o Maintaining and driving the development of new reports of Cyber Threat Intelligence analysis to peers, management and customer teams for purposes of situational awareness and making threat intelligence actionable
o Providing support to the Security Operations Center during incident response and threat hunting activities that include cyber threat analysis support, research, recommending relevant remediation and mitigation
o Conducting trending and correlation research from various cyber intelligence sources for the purposes of indicator collection, shifts in TTPs, attribution, and establishing countermeasures to increase cyber resiliency o One or more of the following computer languages to support cyber threat detection or reporting: Python, Bash, Visual Basic, C++, XML, HTML, and Powershell
o Host-based and network-based forensics related to the identification of advanced cyber threat activities, intrusion detection, incident response, malware analysis, and security content development (e.g., signatures, rules etc.); and cyber threat intelligence. o Developing scripts to support cyber threat detection that outputs results in a variety of formats
o Cyber Kill Chain and applicable analytic models such the Diamond Model o Strong written and oral communication skills Preferred qualification:
Previous DOD, IC, Counter Intelligence, or Law Enforcement (LE) Training/Experience
Knowledge of Structured Analytic Techniques
One of the following certifications: GCED, GCIA, GCFA, GPEN, GWAPT, GCFE, GREM, GXPN, GMON, GCIH, CCFP, CCSP, CISSP, CSIH, CHFI, LPT, ECSA, OSCP, OSCE, OSWP, OSEE, EnCE

Inform a friend!

<!– job description page –>
Top