Cyber Threat Intelligence Analyst Information Technology (IT) - Bluemont, VA at Geebo

Cyber Threat Intelligence Analyst

Description Leidos is seeking a talented Cyber Threat Intelligence Analyst to join our team to support a federal customer within the customers Security Operations.
The Cyber Threat Intel Analyst will need a strong cyber security background with experience with the following:
Identify, track and investigate high priority threat campaigns, malicious actors with the interest, capability and TTPs (Techniques, Tactics and Procedures).
A comprehensive understanding, analyzing and tracking the cyber threat landscape, including identifying and analyzing cyber threats actors, APT TTPs and/or activities to enhance cyber security posture of the organization's IT operating environment.
Clearance Required:
Must have active/current Top Secret clearance with SCI eligibility.
Basic
Qualifications:
Candidates shall have a bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, with five (years) of professional experience and at least three (3) years in incident detection and response and/or cyber intelligence analysis.
Maintain and drive the development of new reports of Cyber Threat Intelligence analysis to peers, management, and customer teams for purposes of situational awareness and making threat intelligence actionable.
Provide support to security operations during incident response and threat hunting activities that includes cyber threat analysis support, research, recommending relevant remediation and mitigation.
Conduct trending and correlation of various cyber intelligence sources for the purposes of indicator collection, shifts in TTPs, attribution and establishing countermeasures to increase cyber resiliency.
Deep understanding of Cyber Kill Chain and applicable analytic models such the Diamond Model.
Strong written and oral communication skills.
Certifications/Skills:
Must have ONE of the following:
GCED, GCIA, GCFA, GPEN, GWAPT, GCFE, GREM, GXPN, GMON, GCIH, CCFP, CCSP, CISSP, CSIH, CHFI, LPT, ECSA, OSCP, OSCE, OSWP, OSEE, EnCE Previous DOD, IC or Law Enforcement Intelligence or Counter Intelligence Training/Experience.
Knowledge of Structured Analytic Techniques Host-based and network-based forensics related to the identification of advanced cyber threat activities, intrusion detection, incident response, malware analysis, and security content development (e.
g.
, signatures, rules etc.
); and cyber threat intelligence.
Proficiency in one more of the following computer languages Python, Bash, Visual Basic or Powershell in order to support cyber threat detection or reporting.
Ability to develop scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML or other type most appropriate for the task.
Original Posting Date:
2024-03-06While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Pay Range:
Pay Range $81,250.
00 - $146,875.
00The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary.
Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Recommended Skills Analytical C+
(Programming Language) Certified Information Systems Security Professional Communication Computer Security Counterintelligence Apply to this job.
Think you're the perfect candidate? Apply on company site $('.
external-apply-email-saved').
on('click', function (event) window.
ExternalApply = window.
open('/interstitial?jobdid=j3t7xj6w064cnmmbp0j', 'ExternalApply-j3t7xj6w064cnmmbp0j'); ); Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.