ROLE AND RESPONSIBILITIES
Serve as a cyber security analyst on the Cyber Threat Fusion team supporting the Department of Energy’s (DOE) headquarters element in D.C. The analyst will be responsible for drafting daily intelligence assessments for current and emerging threats to the Department of Energy’s cyber interests and participating in working groups and leading discussions and briefings at directorate levels.
The analyst will be expected to network with both local and remote Department of Energy locations telephonically or digitally as needed to establish connections with network defenders and analytical elements.
Analysts will also be responsible for remaining well-versed in TTPs for common APTs, as well as other malicious threat actors. This includes: understanding historical infection vectors, exfiltration methods, malware strains, and other necessary intelligence and information needed to preemptively identify and thwart adversarial activity targeting the Department of Energy.
There is no travel associated with this position; however, analysts may be afforded the opportunity to travel to industry-leading cyber security seminars (e.g. Blackhat, DEFCON, DERBYCON, etc.) if they are interested and with approval from the customer.
QUALIFICATIONS AND EDUCATION REQUIREMENTS
● Active TS/SCI
● Holds a degree and least 4-10 years of experience in intelligence analysis – preferably cyber-focused – and at least 2 years of experience in network security and/or engineering. There is no substitution for experience in intelligence analysis.
● Has a working knowledge of common exploitation vectors leveraged against targeted systems
● Needs to be able to conduct vulnerability analysis and leverage multi-intelligence reporting to preemptively thwart future threats to DoE interests
● Must be able to work closely with others as a team player and effectively communicate amongst peers
● Capable of drafting finished intelligence products that may exceed 5-10 pages in length, as well as responding to short-notice requests for analysis with clear, concise, and accurate assessments
● Capable of preparing and delivering highly technical analytical briefs to senior leadership comfortably
● Candidate needs to be self-motivated and able to operate with little oversight or direction
● Be able to learn quickly and understand highly technical concepts as they relate to APT actors and other malicious cyber activity Capable of conceptualize unique methods to address highly technical problem sets.
● Has at least a basic understanding of programming
● Experience with multiple operating systems (e.g. Linux and any of its variations, Windows, macOS, etc.),
● Able to use traditional tools used by cyber-focused professionals (e.g. Splunk, McAffee, FireEye, MetaSploit, Wireshark, ThreatConnect, etc.) as well as the tools used by cyber criminals
● Solid understanding of offensive and defensive cyber operations
● Background in OSINT and/or social media
● Experience in malware analysis
● Currently holds, has held, or is preparing for any of the following certifications (or its equivalent):
NET+ SEC+ GICSP
C|EH GSEC GRID
BWM Outcomes, LLC (BWM) — is a wholly owned, private company established in 2014 with a vision to deliver exceptional support solutions that are innovative, mission-focused and value added to government, law enforcement and business enterprises across a wide spectrum of Cyber Security and Intelligence activities. BWM is a woman owned small business (WOSB), an economically disadvantaged woman owned small business (EDWOSB) and a veteran owned small business (VOSB) company. We are an EEO/M/F/D/V Employer. Check us out at www.bwmoutcomes.com.