Yesterday
Intel Agency (NSA, CIA, FBI, etc)
Mid Level Career (5+ yrs experience)
$150,000 and above
No Traveling
Full Scope Polygraph
IT - Security
Washington, DC (On-Site/Office)
Job Title: Senior Threat Cyber Intelligence Analyst
Location: Local to DMV
Clearance: TS/SCI w Full Scope Poly
Employment Type: Full Time
Education: Bachelor's degree in Cybersecurity, Information Security, or a related field
Work Status: Local to DMV
Salary: $145,000–$185,000
Benefits: Competitive salary and bonus structure, comprehensive health insurance, 401(k) with company match, generous PTO and flexible work options.
Application: Apply here or on our Careers Page @ Careers - Metronome, or email your resume to Careers@wearemetronome.com
Overview:
We are seeking a skilled cybersecurity expert to evaluate the performance of large language models (LLMs) in understanding and interpreting complex cyber incident narratives related to advanced persistent threats (APTs). The successful candidate will create high-quality prompt response pairs to assess the model's ability to extract critical information, identify tactics, techniques, and procedures (TTPs), and correlate events across multiple incident reports.
Key Responsibilities:
Gather and analyze open-source reports on specific cyber incidents or exploits
Synthesize reports into concise and detailed summary narratives
Develop prompt response pairs to evaluate the LLM's comprehension skills, including:
○ Extraction of critical timeline events, mapping of TTPs and correlation of events across disparate incident reports
○ Collaborate with our team to refine the evaluation methodology and provide expert insights
Required Skills
5+ years of experience in cybersecurity, threat intelligence, or incident response
Deep understanding of advanced persistent threats (APTs) and cyber attack methods
Familiarity with cybersecurity frameworks and standards (e.g., MITRE ATT&CK, NIST Cybersecurity Framework)
Experience with threat intelligence platforms and open-source intelligence (OSINT) tools
Strong analytical and writing skills, with the ability to distill complex information into clear and concise narratives
Familiarity with natural language processing (NLP) and LLMs is a plus, but not required
Desired Skills (Optional)
Hands-on experience with security information and event management (SIEM) systems, and threat intelligence platforms
Familiarity with specific APT groups and their TTPs
Knowledge of cloud-based security services, including AWS Security Hub, Google Cloud Security Command Center, or Azure Security Center
Certification in a relevant cybersecurity discipline (e.g., CompTIA Security+, CISSP, CEH) is a plus
Certifications (Preferred):
Certified Information Systems Security Professional (CISSP)
GIAC Certified Incident Handler (GCIH)
Location: Local to DMV
Clearance: TS/SCI w Full Scope Poly
Employment Type: Full Time
Education: Bachelor's degree in Cybersecurity, Information Security, or a related field
Work Status: Local to DMV
Salary: $145,000–$185,000
Benefits: Competitive salary and bonus structure, comprehensive health insurance, 401(k) with company match, generous PTO and flexible work options.
Application: Apply here or on our Careers Page @ Careers - Metronome, or email your resume to Careers@wearemetronome.com
Overview:
We are seeking a skilled cybersecurity expert to evaluate the performance of large language models (LLMs) in understanding and interpreting complex cyber incident narratives related to advanced persistent threats (APTs). The successful candidate will create high-quality prompt response pairs to assess the model's ability to extract critical information, identify tactics, techniques, and procedures (TTPs), and correlate events across multiple incident reports.
Key Responsibilities:
Gather and analyze open-source reports on specific cyber incidents or exploits
Synthesize reports into concise and detailed summary narratives
Develop prompt response pairs to evaluate the LLM's comprehension skills, including:
○ Extraction of critical timeline events, mapping of TTPs and correlation of events across disparate incident reports
○ Collaborate with our team to refine the evaluation methodology and provide expert insights
Required Skills
5+ years of experience in cybersecurity, threat intelligence, or incident response
Deep understanding of advanced persistent threats (APTs) and cyber attack methods
Familiarity with cybersecurity frameworks and standards (e.g., MITRE ATT&CK, NIST Cybersecurity Framework)
Experience with threat intelligence platforms and open-source intelligence (OSINT) tools
Strong analytical and writing skills, with the ability to distill complex information into clear and concise narratives
Familiarity with natural language processing (NLP) and LLMs is a plus, but not required
Desired Skills (Optional)
Hands-on experience with security information and event management (SIEM) systems, and threat intelligence platforms
Familiarity with specific APT groups and their TTPs
Knowledge of cloud-based security services, including AWS Security Hub, Google Cloud Security Command Center, or Azure Security Center
Certification in a relevant cybersecurity discipline (e.g., CompTIA Security+, CISSP, CEH) is a plus
Certifications (Preferred):
Certified Information Systems Security Professional (CISSP)
GIAC Certified Incident Handler (GCIH)
group id: 10443198