Today
Secret
Mid Level Career (5+ yrs experience)
IT - Security
Huntsville, AL (On-Site/Office)
Position Overview:
We are seeking a skilled Cyber Threat Intelligence (CTI) Analyst with a focus on adversary Tactics, Techniques, and Procedures (TTPs) to support cyber defense operations in a mission-critical DoD environment. This position requires strong analytical abilities to assess and track cyber adversaries, identify trends and attack patterns, and provide actionable intelligence for both defensive and proactive cyber operations.
As a member of a multidisciplinary threat intelligence team, you will work closely with cyber defenders, incident responders, and stakeholders to enrich detection capabilities and enhance the organization's overall cybersecurity posture.
Key Responsibilities:
Analyze, document, and track adversary TTPs using frameworks like MITRE ATT&CK, and integrate findings into threat detection strategies.
Produce detailed cyber threat intelligence reports, briefings, and technical advisories for internal and external stakeholders.
Fuse data from multiple sources (e.g., open-source intel, classified feeds, threat hunting) to provide a holistic threat picture.
Collaborate with SOC and Incident Response teams to inform detections and investigations based on threat intelligence findings.
Monitor and report on nation-state, APT, and criminal group activities with relevance to DoD systems and infrastructure.
Conduct trend analysis and assess the evolution of adversary capabilities, intentions, and targeting.
Support cyber exercises and red/blue team engagements to validate intelligence-driven defenses.
Required Qualifications:
Active Secret Clearance (TS/SCI preferred or eligible)
Bachelor’s degree in Cybersecurity, Intelligence Studies, Computer Science, or a related field (or equivalent experience)
5+ years of experience in Cyber Threat Intelligence, Threat Hunting, or Incident Response roles
In-depth knowledge of adversary TTPs, threat actor profiles, and cyber kill chain methodologies
Familiarity with MITRE ATT&CK, Diamond Model, and other CTI frameworks
Strong writing, communication, and briefing skills for both technical and executive audiences
Experience working with tools such as ThreatConnect, MISP, Analyst Notebook, or TIP/SIEM platforms (e.g., Splunk)
Preferred Qualifications:
Prior DoD or IC experience in CTI or cyber operations
Certifications such as GCIA, GCTI, GREM, GCFA, CEH, or Security+
Experience with malware analysis, reverse engineering, or digital forensics
Familiarity with cyber policy and compliance frameworks (e.g., NIST, DoD RMF, STIGs)
Work Environment:
Primary location: Huntsville, AL – on-site with potential hybrid work flexibility based on mission needs
May require occasional travel to attend conferences, briefings, or support operations
We are seeking a skilled Cyber Threat Intelligence (CTI) Analyst with a focus on adversary Tactics, Techniques, and Procedures (TTPs) to support cyber defense operations in a mission-critical DoD environment. This position requires strong analytical abilities to assess and track cyber adversaries, identify trends and attack patterns, and provide actionable intelligence for both defensive and proactive cyber operations.
As a member of a multidisciplinary threat intelligence team, you will work closely with cyber defenders, incident responders, and stakeholders to enrich detection capabilities and enhance the organization's overall cybersecurity posture.
Key Responsibilities:
Analyze, document, and track adversary TTPs using frameworks like MITRE ATT&CK, and integrate findings into threat detection strategies.
Produce detailed cyber threat intelligence reports, briefings, and technical advisories for internal and external stakeholders.
Fuse data from multiple sources (e.g., open-source intel, classified feeds, threat hunting) to provide a holistic threat picture.
Collaborate with SOC and Incident Response teams to inform detections and investigations based on threat intelligence findings.
Monitor and report on nation-state, APT, and criminal group activities with relevance to DoD systems and infrastructure.
Conduct trend analysis and assess the evolution of adversary capabilities, intentions, and targeting.
Support cyber exercises and red/blue team engagements to validate intelligence-driven defenses.
Required Qualifications:
Active Secret Clearance (TS/SCI preferred or eligible)
Bachelor’s degree in Cybersecurity, Intelligence Studies, Computer Science, or a related field (or equivalent experience)
5+ years of experience in Cyber Threat Intelligence, Threat Hunting, or Incident Response roles
In-depth knowledge of adversary TTPs, threat actor profiles, and cyber kill chain methodologies
Familiarity with MITRE ATT&CK, Diamond Model, and other CTI frameworks
Strong writing, communication, and briefing skills for both technical and executive audiences
Experience working with tools such as ThreatConnect, MISP, Analyst Notebook, or TIP/SIEM platforms (e.g., Splunk)
Preferred Qualifications:
Prior DoD or IC experience in CTI or cyber operations
Certifications such as GCIA, GCTI, GREM, GCFA, CEH, or Security+
Experience with malware analysis, reverse engineering, or digital forensics
Familiarity with cyber policy and compliance frameworks (e.g., NIST, DoD RMF, STIGs)
Work Environment:
Primary location: Huntsville, AL – on-site with potential hybrid work flexibility based on mission needs
May require occasional travel to attend conferences, briefings, or support operations
group id: 91134553