Today
Top Secret/SCI
Mid Level Career (5+ yrs experience)
IT - Security
Arlington, VA (On-Site/Office)
You will:
Leverage open-source, proprietary/vendor, and classified reporting to closely track advanced persistent threat actor activity.
Perform pattern, trend, and behavior analysis, as well as other specialized analysis techniques to identify malicious cyber threat activity targeting Department of State (DoS) information, systems and personnel.
Maintain records to catalog and track malicious cyber threat activity targeting DoS information, systems and personnel.
Identify Indicators of Compromise (IOCs) present on an Enterprise network through the use of a SIEM and other security tools and logs.
Liaise with members of the Intelligence Community (IC); and Acts as the fusion analysis cell within Cyber Threat Analysis Division (CTAD).
Provide presentations to a variety of technical and non-technical audiences pertaining to cyber threats.
Need to be able to travel - up to 10% travel - to foreign and domestic locations.
Qualifications
Basic Requirements:
Bachelor's degree and 9 years of relevant experience is required. An additional 4 years of experience may be considered in lieu of degree.
Possess and maintain ONE of the following certifications:
CCNA-Security, CND, CySA+, GICSP, GSEC, Security+ CE, SSCP.
Experience with Splunk SIEM.
Experience leveraging the MITRE ATT&CK matrix or other threat models (e.g. Lockheed Martin Kill Chain, Diamond Model).
Knowledge or experience tracking Advanced Persistent Threats (APTs).
Knowledge or experience pivoting from IOCs to identify related infrastructure.
Demonstrated written communication skills, communicating technical topics in an analytic fashion.
Experience briefing individuals and large groups, ranging from the working to executive level.
Demonstrated ability to work independently as well as with a team of other analysts.
Active U.S. Passport and the ability to travel up to two weeks at a time, both foreign and domestically (up to10%).
Leverage open-source, proprietary/vendor, and classified reporting to closely track advanced persistent threat actor activity.
Perform pattern, trend, and behavior analysis, as well as other specialized analysis techniques to identify malicious cyber threat activity targeting Department of State (DoS) information, systems and personnel.
Maintain records to catalog and track malicious cyber threat activity targeting DoS information, systems and personnel.
Identify Indicators of Compromise (IOCs) present on an Enterprise network through the use of a SIEM and other security tools and logs.
Liaise with members of the Intelligence Community (IC); and Acts as the fusion analysis cell within Cyber Threat Analysis Division (CTAD).
Provide presentations to a variety of technical and non-technical audiences pertaining to cyber threats.
Need to be able to travel - up to 10% travel - to foreign and domestic locations.
Qualifications
Basic Requirements:
Bachelor's degree and 9 years of relevant experience is required. An additional 4 years of experience may be considered in lieu of degree.
Possess and maintain ONE of the following certifications:
CCNA-Security, CND, CySA+, GICSP, GSEC, Security+ CE, SSCP.
Experience with Splunk SIEM.
Experience leveraging the MITRE ATT&CK matrix or other threat models (e.g. Lockheed Martin Kill Chain, Diamond Model).
Knowledge or experience tracking Advanced Persistent Threats (APTs).
Knowledge or experience pivoting from IOCs to identify related infrastructure.
Demonstrated written communication skills, communicating technical topics in an analytic fashion.
Experience briefing individuals and large groups, ranging from the working to executive level.
Demonstrated ability to work independently as well as with a team of other analysts.
Active U.S. Passport and the ability to travel up to two weeks at a time, both foreign and domestically (up to10%).
group id: 10176392