Sr. Cyber Threat Intelligence Analyst
Washington, DC
Full Time Senior-level / Expert Clearance required USD 88K - 164K * est.
cFocus Software Incorporated
Our exclusive ATO as a Service™ software & expert services automate FISMA RMF & FedRAMP compliance.
cFocus Software seeks a Senior Cyber Threat Intelligence Analyst to join our program supporting AOUSC. This position is fully remote. This position requires active Public Trust clearance.
Qualifications:
Duties:
Qualifications:
- 8 years’ experience in conducting in-depth analysis of cyber threats, including malware, phishing campaigns, and other attack vectors. This involves identifying patterns, trends, and indicators of compromise (IOCs) to understand threat actor tactics, techniques, and procedures (TTPs).
- 8 years’ experience in collecting and aggregating threat intelligence from various sources, such as opensource intelligence (OSINT), dark web forums, and commercial threat intelligence feeds. This includes evaluating the credibility and relevance of intelligence sources and identifying actionable intelligence for the organization.
- 8 years’ experience in producing high-quality written and oral reports, briefings, and presentations to communicate threat intelligence findings, assessments, and recommendations to stakeholders at all levels of the organization.
- 5 years working in an office environment with technical IT personnel.
- 5 years of experience with Microsoft Office Tools such as Word, PowerPoint, Excel, and OneNote
- 5 years of experience using cybersecurity tools and technologies for threat intelligence analysis, such as threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and malware analysis tools.
- Bachelor’s degree in Cybersecurity preferred
- Security + is required and Network + or equivalent is preferred
Duties:
- Identify emerging cyber threats, vulnerabilities, and attack trends based on information from various sources, including open-source research, dark web forums, and threat intelligence feeds.
- Conduct in-depth analysis of cyber threat intelligence data to identify patterns, trends, and indicators of compromise (IOCs) associated with potential cyber-attacks. This includes analyzing malware samples, phishing emails, and other threat artifacts to understand threat actor TTPs.
- Produce high-quality written and oral reports, briefings, and presentations to communicate cyber threat intelligence findings, assessments, and recommendations to senior leadership, stakeholders, and technical teams in a clear and actionable manner.
- Proactively search for signs of malicious activity within the organization's network and systems utilizing threat intelligence to identify and investigate potential security incidents or anomalies.
- Enhance the organization's cyber threat intelligence capabilities and methodologies in accordance with the latest cybersecurity threats, trends, and technologies.
- Contribute to the development of cybersecurity strategies, policies, and procedures based on threat intelligence insights and analysis, helping to prioritize security investments and initiatives to mitigate emerging threats effectively.
- Provide mentorship, guidance, and training to other contractor’s employees, including sharing knowledge and best practices to build a skilled and cohesive cyber threat intelligence team.
- Participate in information sharing initiatives and collaborate with industry peers, government agencies, and cybersecurity communities to exchange threat intelligence and enhance collective cyber defense capabilities.
- Collaborate with vulnerability management teams to prioritize and assess the severity of vulnerabilities based on threat intelligence data, enabling informed decisions on patching and remediation efforts.
- Provide written recommendations on Government drafts of executive summaries and briefings.
- Provide recommendations and input on other content and presentations.
- Incorporate data from Mandiant, federal partners, and other vendors to expand threat awareness and bolster proactive defense strategies.
- Examine malware samples from diverse sources using reverse engineering techniques to uncover capabilities, origins, and threat actor methodologies.
- Detect and study emerging vulnerabilities, attack trends, and threat patterns through internal data, open-source intelligence, and integrated feeds from trusted platforms.
- Use Splunk and other tools to identify unusual activities, create actionable alerts, and monitor potential security incidents in real time.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
2
0
0
Categories:
Analyst Jobs
Threat Intel Jobs
Tags: Clearance Cyber defense Malware OSINT Reverse engineering SIEM Splunk Threat intelligence TTPs Vulnerabilities Vulnerability management
Regions:
Remote/Anywhere
North America
Country:
United States
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Information Security Specialist jobsInformation System Security Officer jobsSenior Security Analyst jobsSenior Cloud Security Engineer jobsSenior Cybersecurity Engineer jobsSystems Administrator jobsSystems Engineer jobsInformation Security Manager jobsSenior Information Security Analyst jobsSenior Network Security Engineer jobsCyber Security Specialist jobsIT Security Engineer jobsIT Security Analyst jobsChief Information Security Officer jobsSecurity Specialist jobsSecurity Consultant jobsInformation System Security Officer (ISSO) jobsInformation Systems Security Engineer jobsSenior Cyber Security Engineer jobsCyber Threat Intelligence Analyst jobsSenior Product Security Engineer jobsSenior Information Security Engineer jobsCyber Security Architect jobsThreat Intelligence Analyst jobsSenior Software Engineer jobs
Java jobsEncryption jobsBash jobsTS/SCI jobsEDR jobsIDS jobsThreat detection jobsSQL jobsIPS jobsSplunk jobsMalware jobsTerraform jobsSDLC jobsTop Secret jobsSOC 2 jobsFinance jobsForensics jobsDocker jobsRMF jobsIntrusion detection jobsCompTIA jobsActive Directory jobsGIAC jobsITIL jobsOWASP jobs
VPN jobsData Analytics jobsDoDD 8570 jobsHIPAA jobsOSCP jobsAnsible jobsIT infrastructure jobsTCP/IP jobsCRISC jobsSAP jobsUNIX jobsCCSP jobsBanking jobsSANS jobsSOAR jobsClearance Required jobsMITRE ATT&CK jobsSOX jobsJavaScript jobsMachine Learning jobsSecurity strategy jobsZero Trust jobsDNS jobsJira jobsNIST 800-53 jobs