Cyber Threat Program Manager - Public Trust
Washington, DC
Full Time Mid-level / Intermediate Clearance required USD 117K - 218K *
cFocus Software Incorporated
Our exclusive ATO as a Service™ software & expert services automate FISMA RMF & FedRAMP compliance.
cFocus Software is seeking a Cyber Program Manager to join our program supporting United States Courts, Information Technology Security Office in Washington, DC. This position requires US Citizenship and the ability to obtain a Public Trust clearance.
Qualifications:
Qualifications:
- Active Public Trust Clearance
- Project Management Professional (PMP) certification and/or Certified Information Systems Security Professional (CISSP) and a minimum of seven (7) year’s total project management.
- Bachelor’s degree or equivalent in a computer, engineering, or science field.
- 3 years of experience as a Program Manager supporting a “large” or Government organization.
- 5 years’ experience with the Cyber Security industry to include policies and procedures, technical
- standards, and methods.
- 7 years’ experience with MS Project, SharePoint, and other project management tools.
- 7 years’ experience coordinating the efforts of subcontractors, team members.
- 7 years’ experience with general management and auditing techniques for identifying problems, gathering, and analyzing pertinent information, forming conclusions, developing solutions, and implementing plans consistent with management goals.
- 5 years’ experience in planning, managing, and providing guidance pertaining to Forensics and Malware Analysis and Threat Hunting Services.
- 7 years’ experience and accountability for the technical correctness, timeliness and quality of deliverables, and the implementation and measurement of corporate and client quality standards and methodologies.
- Conduct analysis and research on the latest advanced cyber threats to provide actionable threat intelligence services, including adversary indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs), behaviors, and trends to help our clients defend their client base.
- Provide technological oversight and apply program and financial management techniques to ensure the on-time, high-quality delivery of products and ensure their compliance with all contract requirements.
- Work with clients on technology strategy development, implementation, and accountability.
- Coach, mentor, and lead staff with diverse skillsets and backgrounds and provide day-to-day leadership to navigate requirements, budget constraints, and staffing challenges.
- Lead the development and implementation of the cyber threat intelligence program, including defining objectives, strategies, roadmap, and tactics to effectively identify, assess, and mitigate cyber threats.
- Utilize your expertise in intelligence and threat hunting to proactively identify emerging threats, vulnerabilities, and risks to our organization's assets and infrastructure.
- Track and update the organization’s priority intelligence requirements.
- Collaborate with cross-functional teams, including security operations, incident response, and IT teams, to integrate threat intelligence into security processes and systems.
- Conduct in-depth analysis of threat actor tactics, techniques, and procedures (TTPs) to enhance detection capabilities and improve response strategies.
- Create and deliver threat intelligence reports, briefings, and presentations with regular cadence to technical, business, and executive stakeholders, translating complex technical information into actionable insights.
- Act as a key member of the team during incident responses activities and analysis.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
0
0
0
Categories:
Leadership Jobs
Threat Intel Jobs
Tags: Audits CISSP Clearance Compliance Forensics Incident response Malware SharePoint Strategy Threat intelligence TTPs Vulnerabilities
Region:
North America
Country:
United States
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Security Operations Engineer jobsPenetration Tester jobsSenior Cybersecurity Engineer jobsSenior Cyber Security Engineer jobsInformation Security Officer jobsInformation Systems Security Officer jobsPrincipal Security Engineer jobsCloud Security Architect jobsSenior Network Security Engineer jobsInformation System Security Officer jobsChief Information Security Officer jobsSenior Penetration Tester jobsStaff Security Engineer jobsSecurity Specialist jobsSecurity Consultant jobsCyber Security Specialist jobsIT Security Engineer jobsSenior Information Security Analyst jobsCyber Security Architect jobsSecurity Operations Analyst jobsSenior Product Security Engineer jobsCybersecurity Consultant jobsInformation System Security Officer (ISSO) jobsThreat Intelligence Analyst jobsSenior Information Security Engineer jobs
SaaS jobsSDLC jobsMalware jobsEncryption jobsRMF jobsForensics jobsSQL jobsGDPR jobsIPS jobsSplunk jobsIDS jobsTop Secret jobsEDR jobsTerraform jobsDoDD 8570 jobsFinance jobsBash jobsITIL jobsOWASP jobsCRISC jobsUNIX jobsGIAC jobsCompTIA jobsIntrusion detection jobsDocker jobs
TCP/IP jobsBanking jobsThreat detection jobsActive Directory jobsSANS jobsData Analytics jobsPolygraph jobsCCSP jobsOSCP jobsClearance Required jobsVPN jobsCyber defense jobsAnsible jobsSOC 2 jobsIT infrastructure jobsJavaScript jobsSOX jobsDNS jobsSOAR jobsJira jobsGCIH jobsSecurity strategy jobsNIST 800-53 jobsOracle jobsCryptography jobs