Senior Cyber Threat Intelligence Analyst
Washington, DC
Full Time Senior-level / Expert Clearance required USD 103K - 192K * est.
cFocus Software Incorporated
Our exclusive ATO as a Service™ software & expert services automate FISMA RMF & FedRAMP compliance.
cFocus Software seeks a Senior Cyber Threat Intelligence Analyst to join our program supporting Administrative Office of the United States Courts (AOUSC). This position is on-site in Washington, DC. This position requires the ability to obtain a Public Trust clearance.
Qualifications:
Qualifications:
- Masters or Bachelors degree in Information Technology, Computer Science, Business Administration, or a related field
- 10 years’ experience in conducting in-depth analysis of cyber threats, including malware, phishing campaigns, and other attack vectors. This involves identifying patterns, trends, and indicators of compromise (IOCs) to understand threat actor tactics, techniques, and procedures (TTPs).
- 10 years’ experience in collecting and aggregating threat intelligence from various sources, such as opensource intelligence (OSINT), dark web forums, and commercial threat intelligence feeds. This includes evaluating the credibility and relevance of intelligence sources and identifying actionable intelligence for the organization.
- 10 years’ experience in producing written and oral reports, briefings, and presentations to communicate threat intelligence findings, assessments, and recommendations to stakeholders at all levels of the organization.
- 5 years working in an office environment with technical IT personnel.
- 5 years of experience with Microsoft Office Tools such as Word, PowerPoint, Excel, and OneNote
- 5 years of experience using cybersecurity tools and technologies for threat intelligence analysis, such as threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and malware analysis tools.
- Security + is required and Network + or equivalent is preferred
- Identify emerging cyber threats, vulnerabilities, and attack trends based on information from various sources, including open-source research, dark web forums, and threat intelligence feeds.
- Conduct in-depth analysis of cyber threat intelligence data to identify patterns, trends, and indicators of compromise (IOCs) associated with potential cyber-attacks. This includes analyzing malware samples, phishing emails, and other threat artifacts to understand threat actor TTPs.
- Produce high-quality written and oral reports, briefings, and presentations to communicate cyber threat intelligence findings, assessments, and recommendations to senior leadership, stakeholders, and technical teams in a clear and actionable manner.
- Proactively search for signs of malicious activity within the organization's network and systems utilizing threat intelligence to identify and investigate potential security incidents or anomalies.
- Enhance the organization's cyber threat intelligence capabilities and methodologies in accordance with the latest cybersecurity threats, trends, and technologies.
- Contribute to the development of cybersecurity strategies, policies, and procedures based on threat intelligence insights and analysis, helping to prioritize security investments and initiatives to mitigate emerging threats effectively.
- Provide mentorship, guidance, and training to other contractor’s employees, including sharing knowledge and best practices to build a skilled and cohesive cyber threat intelligence team.
- Participate in information sharing initiatives and collaborate with industry peers, government agencies, and cybersecurity communities to exchange threat intelligence and enhance collective cyber defense capabilities.
- Collaborate with vulnerability management teams to prioritize and assess the severity of vulnerabilities based on threat intelligence data, enabling informed decisions on patching and remediation efforts.
- Provide written recommendations on Government drafts of executive summaries and briefings.
- Provide recommendations and input on other content and presentations.
- Incorporate data from Mandiant, federal partners, and other vendors to expand threat awareness and bolster proactive defense strategies.
- Examine malware samples from diverse sources using reverse engineering techniques to uncover capabilities, origins, and threat actor methodologies.
- Detect and study emerging vulnerabilities, attack trends, and threat patterns through internal data, open-source intelligence, and integrated feeds from trusted platforms.
- Use Splunk and other tools to identify unusual activities, create actionable alerts, and monitor potential security incidents in real time.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
5
0
0
Categories:
Analyst Jobs
Threat Intel Jobs
Tags: Clearance Computer Science Cyber defense Malware OSINT Reverse engineering SIEM Splunk Threat intelligence TTPs Vulnerabilities Vulnerability management
Region:
North America
Country:
United States
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Information Systems Security Officer jobsInformation System Security Officer jobsInformation Security Officer jobsSenior Cybersecurity Engineer jobsSenior Cloud Security Engineer jobsInformation Security Manager jobsCyber Security Specialist jobsIT Security Engineer jobsSystems Engineer jobsSenior Network Security Engineer jobsSystems Administrator jobsSenior Information Security Analyst jobsSecurity Consultant jobsSenior Cyber Security Engineer jobsSecurity Specialist jobsIT Security Analyst jobsChief Information Security Officer jobsInformation System Security Officer (ISSO) jobsInformation Systems Security Engineer jobsThreat Intelligence Analyst jobsSenior Penetration Tester jobsCyber Security Architect jobsSecurity Operations Analyst jobsSenior Information Security Engineer jobsCyber Threat Intelligence Analyst jobs
Encryption jobsTop Secret jobsGDPR jobsSaaS jobsSplunk jobsMalware jobsEDR jobsRMF jobsSDLC jobsBash jobsSQL jobsForensics jobsIDS jobsThreat detection jobsIPS jobsActive Directory jobsFinance jobsDoDD 8570 jobsIntrusion detection jobsITIL jobsCompTIA jobsCRISC jobsDocker jobsTerraform jobsGIAC jobs
OWASP jobsHIPAA jobsSOC 2 jobsClearance Required jobsSANS jobsUNIX jobsCCSP jobsIndustrial jobsSAP jobsOSCP jobsJavaScript jobsVPN jobsTCP/IP jobsAnsible jobsBanking jobsDNS jobsPolygraph jobsSOX jobsData Analytics jobsMachine Learning jobsIT infrastructure jobsJira jobsCISO jobsVMware jobsNIST 800-53 jobs