Senior Cyber Threat Intelligence Analyst
USA-VA-Herndon, USA-Remote Work
Full Time Senior-level / Expert Clearance required USD 88K - 163K * est.
General information
Requisition # R60629 Locations USA-VA-Herndon, USA-Remote Work Posting Date 05/21/2025 Security Clearance Required Secret Remote Type Hybrid Time Type Full timeDescription & Requirements
Transform the future of federal services with ManTech! Join a vibrant, energetic team committed to enhancing national security and public services through innovative tech. Since 1968, we’ve partnered with Federal Civilian sectors to deliver impactful solutions. Engage in exciting projects in Digital Transformation, Cybersecurity, IT, Data Analytics and more. Ignite your career and drive change. Your journey starts now—innovate and excel with ManTech!ManTech seeks a motivated, career and customer-oriented Senior Cyber Threat Intelligence Analyst to join our team in the DC, Maryland, and Virginia (DMV) area.
In this role you will support the design, development, implementation, and improvement of the enterprise Cybersecurity Threat Intelligence (CTI) program. You will be responsible for monitoring open source intelligence feeds, sources, websites, etc., to identify emerging and zero-day threats and potential risks to enterprise security; compiling and synthesizing reports, analyzing, e.g., threat vectors and method of attack via MITRE ATT&CK and the cyber kill chain; composing emails and strategic communications to inform subscribers and stakeholders of emerging risks, etc. The Cyber Security Threat Intelligence Analyst will collaborate with other internal and external POCs and teams improving the security posture of the DHS enterprise.
Responsibilities include but are not limited to:
- Collaborate with incident response teams to investigate, analyze, and remediate identified threats; Stay current with the latest cyber threat intelligence, trends, and technologies
- Identify and assess the capabilities and activities of cyber criminals or foreign intelligence entities; design and administer procedures in the organization that sustains the security of the organization’s data and access to its technology and communications systems
- Monitor open source intelligence feeds, sources, websites, etc., to identify emerging and zero-day threats and potential risks to enterprise security; compiling and synthesizing reports, analyzing, e.g., threat vectors and method of attack via MITRE ATT&CK and the cyber kill chain
- Proactively search for and identify cyber threats, including advanced persistent threats (APTs), that could compromise DHS networks and systems
- Analyze network traffic, system logs, and other data sources to detect anomalies and indicators of compromise (IOCs)
- Develop and provide threat intelligence reports, advise and use methodologies, techniques, and tools to improve detection capabilities
- Create and refine threat detection use cases and correlation rules within SIEM and other security tools
Minimum Qualifications:
- Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field
- 8+ years of experience in cybersecurity with a focus on SIEM engineering and operations
- Proficiency with threat hunting tools and platforms (e.g., Splunk, ELK Stack, CrowdStrike, Carbon Black).
- Strong understanding of network protocols, system logs, and security event correlation.
- Experience in analyzing malware, attack vectors, and threat actor TTPs.
- 8570 compliant certifications; relevant certifications such as CISSP, GCIH, GCFA, GCIA, or similar are highly desirable.
- Relevant certifications such as CISSP, CISM, CEH, or SIEM-specific certifications (e.g., Splunk Certified Power User) are highly desirable
Preferred Qualifications:
- Previous Network Operations Center (NOC) or IT Operations experience
- Familiarity with DHS policies and procedures.
- Knowledge of broader cybersecurity frameworks (e.g., NIST, ISO 27001).
- Understanding of ITIL4 principles
- Master’s Degree
Clearance Requirements:
- Must have a current/active Secret clearance with the ability to obtain and maintain a TS/SCI.
- The ability to obtain and maintain a DHS EOD suitability is required prior to starting this position.
Physical Requirements:
- Must be able to remain in a stationary position 50%
- Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer
- The person in this position needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
ManTech International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with ManTech, please email us at careers@mantech.com and provide your name and contact information.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics Carbon Black CEH CISM CISSP Clearance Clearance Required Computer Science CrowdStrike Cyber Kill Chain Data Analytics DoDD 8570 ELK GCFA GCIA GCIH Incident response ISO 27001 Malware MITRE ATT&CK Monitoring NetOps NIST Open Source POCs Security Clearance SIEM Splunk Threat detection Threat intelligence TS/SCI TTPs Zero-day
Perks/benefits: Career development
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.