Cyber Threat Analyst

Eagle Ray Inc Springfield , VA 22156

Posted 2 months ago

Overview

Eagle Ray is looking to produce, per analyst on average, 36 weekly threat reports, 8 monthly threat reports, three quarterly threat reports, and one annual threat study for each specific focus or area. In addition, each analyst will average 6 reports of inquiry (ROI) and or requests for information (RFI) and publish or contribute to nine Intelligence Information Reports (IIR) annually. Finally, each analyst will produce, on average, 48 weekly status reports. Reports will conform to the information below.

Responsibilities

  • Produce weekly, monthly, quarterly, and annual actionable Technical CI cyber threat reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary.

  • Produce CI Information Reports and IIRs from data collected and reported by either the Technical CI team or the NGA cyber security personnel.

  • Perform inquiries and develop leads of anomalous activity using automated investigative tools as well as conducting open source and classified research to identify patterns, commonalities, and linkages.

  • Provide Technical CI advice and expertise in support of CI inquiries, operations and issues.

  • Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers.

  • Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner and ability to self-edit and produce properly sourced and grammatically correct intelligence products.

  • Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.

  • Display an ability to collaborate with internal NGA and external IC/Cyber community members.

  • Coordinate CI Cyber activities originating from Enterprise Incident Response Events.

  • Conduct liaison between CI Office and Cyber Security Operations Center (CSOC).

  • Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures.

Qualifications

Required:

  • Active TS/SCI

  • Min. of 7 yrs. experience, with a minimum of 5 yrs. Technical Threat Analysis or cyber investigations experience.

  • Bachelor's degree.

Desired:

  • Bachelor's degree in Science, Technology, Engineering, or Mathematics.

  • Post-graduate degree in Science, Technology, Engineering, or Mathematics.

  • Be a credentialed graduate of an accredited federal or DoD CI training academy.

  • Demonstrates experience with foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to the US Government.

Equal Opportunity Employer/M/F/Disability/Vet/Sexual Orientation/Gender Identity


upload resume icon
See if you are a match!

See how well your resume matches up to this job - upload your resume now.

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Counterintelligence Cyber Officer Level 4 Technical Analyst

Advanced C4 Solutions, Inc. (Ac4s)

Posted Yesterday

VIEW JOBS 1/23/2019 12:00:00 AM 2019-04-23T00:00 <span style="font-size:14px;"><span style="font-family:arial,helvetica,sans-serif;">The Team Chief will ensure all required reports are complete with minimal errors and that all processes, activities, and reports are conducted with in established time frames.  The Team Chief will also ensure analysts are trained in and follow the current standard operating procedures. </span></span><br /> <br /> <br /> <span style="font-size:14px;"><span style="font-family:arial,helvetica,sans-serif;"><strong><u>Duties may include:</u></strong></span></span><br />   <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;">Support team members in completing forensics reports, CI Cyber Inquiries, and monthly, quarterly, and annual CI Cyber Threat reports.</span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;">Identify, analyze, define, and coordinate user, customer and stakeholder needs and translate them into technical requirements.</span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;">Detect anomalous activity through network data analysis. </span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;">Develop custom scripts/programs for automated cyber analytical tools. </span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;">Record best practices, lessons-learned, processes and procedures, and other pertinent quality topics in appropriate formats. </span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;">Evaluate and analyze Intrusion Detection, incident tickets, event and log analysis, security change tracking and other network security systems and devices to identify risks and make recommendations for corrective actions.</span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;">Investigate instances of malicious code to determine attack vector, payload, potential origin, and determine extent of damage and data exfiltration and provide written reports based on findings. </span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;">Assist in the development and delivery of malware threat awareness products and briefings.</span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;">Collaborate with customers and team members to facilitate a premier malware program. </span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;">Coordinate CI Cyber activities originating from Enterprise Incident Response Events.</span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;">Conduct liaison between CI Office and CSOC.</span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;">Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures</span></li> </ul> <br /> <br /> <span style="font-size:14px;"><span style="font-family:arial,helvetica,sans-serif;"><strong><u>Skills and Experience:</u></strong><br /> <br /> <strong>Required:</strong></span></span> <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:arial,helvetica,sans-serif;">Shall possess 11 years of network analysis experience. Possess experience with industry network analysis tools, such as Wireshark. Shall possess strong research, critical thinking and analytic skills. Strong written and oral communication skills.</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:arial,helvetica,sans-serif;">Shall possess a Bachelor’s Degree (in Computer Science, Engineering, or a related technical discipline preferred). </span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:arial,helvetica,sans-serif;">Must obtain and maintain IAT III certification to comply with DoD 8570.01-M Information Assurance Technical (IAT) requirements within one calendar year of assignment at the sole expense of the vendor.</span></span></li> </ul> <br /> <br /> <span style="font-size:14px;"><span style="font-family:arial,helvetica,sans-serif;"><strong>Desired:</strong></span></span> <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:arial,helvetica,sans-serif;">Possess post-graduate degree in Computer Science, Engineering, or a related technical discipline.    </span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:arial,helvetica,sans-serif;">Experience with malware analysis.</span></span></li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"><span style="font-size:14px;"><span style="font-family:arial,helvetica,sans-serif;">Shall be a credentialed graduate of an accredited federal or DoD CI training academy.</span></span></li> </ul> <br /> <br /> <br /> <span style="font-size:14px;"><span style="font-family:arial,helvetica,sans-serif;"><strong><em>SECURITY CLEARANCE IS REQUIRED</em></strong><br />  <br /> <strong>AC4S is an Equal Opportunity Employer, including disabled and vets</strong></span></span> Advanced C4 Solutions, Inc. (Ac4s) Springfield VA

Cyber Threat Analyst

Eagle Ray Inc