Cyber Threat Hunter/ Intel Analyst


CGI Group Inc. Huntsville , AL 35801

Posted Today

Meet our professionals

CGI: An employer of choice

Position Description:

CGI Federal is seeking qualified applicants for a Cyber Threat Hunter/ Intel Analyst position that will serve as part of a Cyber Threat Analysis Center (CTAC) team in Huntsville, AL. Qualified applicants will be responsible for participating in threat actor based investigations to detect, disrupt and eradicate the presence of threat actors from enterprise networks. To meet this goal you will utilize the latest in cyber security technology to provide Computer Network Defense and Cyber Threat Intelligence support to CGI Federal and its customers.

Your future duties and responsibilities:

The responsibilities of the Cyber Threat Hunter/ Intel Analyst include, but are not limited to:

  • Monitor and analyze network traffic and security alerts, respond to potential threats/vulnerabilities.

  • Investigate intrusion attempts and perform in-depth analysis of exploits.

  • Provide network intrusion detection expertise to support timely and effective decision making of when to declare an incident.

  • Conduct Open Source cyber threat intelligence research to identify threat actor motivations, capabilities, and intentions.

  • Perform initial triage on security events that are populated in a Security Information and Event Management (SIEM) system.

  • Analyze a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths for each incident.

  • Independently follow procedures to contain, analyze, and eradicate malicious activity.

  • Document all activities during an incident and providing leadership with status updates during the life cycle of the incident.

  • Develop advanced queries and alerts to detect adversary actions

  • Hunt for and identify threat actor groups based on their known techniques, tactics, procedures (TTPs), tools and infrastructure.

  • Identify and track new tactics, techniques, and procedures (TTPs) associated with known threat actors to enhance our cyber threat intelligence database.

  • Capture intelligence on threat actor TTPs and develop countermeasures in response to threat actors.

  • Provide thoroughly vetted intelligence products on emerging cyber threats, indicators of compromise and trend analysis.

  • Create a final incident report detailing the events of the incident.

  • Provide information regarding intrusion events, security incidents, and other threat indications and warning information to US government agencies.

  • Assist with the development of processes and procedures to improve incident response times, analysis of incidents, and overall SOC operations.

Required qualifications to be successful in this role:

  • Education or Experience:

  • Minimum of two (2) years of direct experience in an IT Security, Incident Response or Security Analyst role within the last 4 years

  • Experience with cyber advanced persistent threats, actors, infrastructure, and TTPs

  • Experience and extensive knowledge working with a SIEM and performing triage, information gathering and analysis

  • Experience in Security Incident Handling and Incident Management procedures

  • Experience with writing clear and concise technical documents specifically event analysis and incident handling documentation

  • Experience with Intrusion Detection and Prevention Systems

  • Demonstrate knowledge of the TCP/IP stack and other protocols

  • Knowledge of computer networking, routing and switching

  • Experience with Linux/UNIX and Windows based devices at the System Administrator level

  • Working knowledge of security architectures and devices

  • In-depth knowledge of lateral movement methods, foothold tactics, and data exfiltration techniques

  • Experience with Account Management, Windows Events and Log Management

  • Organizational skills and the ability to work autonomously with attention to detail and processes

  • Excellent communication skills with experience providing incident briefings to peers, management and clients

  • Excellent written skills with experience creating formal incident reports


  • Industry recognized professional certification such as CISSP, GCIH, GCIA, CEH, Security+

  • Past experience with or current understanding of government intelligence processes and systems

  • Direct experience with Malware and Fusion analysis techniques and methodologies

  • Scripting skills (e.g., PERL, Python, shell scripting)

  • US Federal Government security clearance (Public Trust), or the ability to obtain a clearance




  • Incident Response

  • InsiderThreatVulnerabilityAsse

  • Unix/Linux System Admin

What you can expect from us:

Build your career with us.

It is an extraordinary time to be in business. As digital transformation continues to accelerate, CGI is at the center of this changesupporting our clients' digital journeys and offering our professionals exciting career opportunities.

At CGI, our success comes from the talent and commitment of our professionals. As one team, we share the challenges and rewards that come from growing our company, which reinforces our culture of ownership. All of our professionals benefit from the value we collectively create.

Be part of building one of the largest independent technology and business services firms in the world.

Learn more about CGI at

No unsolicited agency referrals please.

CGI is an equal opportunity employer.

Qualified applicants will receive consideration for employment without regard to their race, ethnicity, ancestry, color, sex, religion, creed, age, national origin, citizenship status, disability, medical condition, military and veteran status, marital status, sexual orientation or perceived sexual orientation, gender, gender identity, and gender expression, familial status, political affiliation, genetic information, or any other legally protected status or characteristics.

CGI provides reasonable accommodations to qualified individuals with disabilities. If you need an accommodation to apply for a job in the U.S., please email the CGI U.S. Employment Compliance mailbox at You will need to reference the requisition number of the position in which you are interested. Your message will be routed to the appropriate recruiter who will assist you. Please note, this email address is only to be used for those individuals who need an accommodation to apply for a job. Emails for any other reason or those that do not include a requisition number will not be returned.

We make it easy to translate military experience and skills! Click here to be directed to our site that is dedicated to veterans and transitioning service members.

All CGI offers of employment in the U.S. are contingent upon the ability to successfully complete a background investigation. Background investigation components can vary dependent upon specific assignment and/or level of US government security clearance held.

CGI will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with CGI's legal duty to furnish information.

icon no score

See how you match
to the job

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Cyber Threat Hunt Analyst Advanced (1323695)


Posted 3 weeks ago

VIEW JOBS 2/5/2020 12:00:00 AM 2020-05-05T00:00 PeopleTec is currently seeking a Cyber Threat Hunt Analyst - Advanced to support our Huntsville, AL location. The successful candidate will support the customer in cyber-threat hunting and associated investigations of systems under the supervision of a Team Lead. The investigations support protection of the customer's mission systems and the supply chain used to develop their products. The candidate will be part of a team that will perform cyber-threat hunting to identify potential cyber-threat activity within their networks/systems. The successful candidate will perform hands-on investigations that require critical thinking and a broad understanding of multiple technologies. The incumbent will support development of presentations and reports to document findings and will require good communication and interpersonal skills to convey findings in a tactful manner at the technical proficiency level of the audience. Required Skills/Experience: * Hold an Information Assurance Management (IAM) Level III certification as identified in DoD 8570. These are either a Certified Information Systems Security Professional (CISSP), Certified Information Systems Manager (CISM), or GIAC Security Leadership Certificate (GSLC) certification in good standing or obtain one within 6 months of hire * Assist in the development and execution of cyber threat-hunting tactics, techniques, and procedures (TTPs) * Serve as a data analysis expert for output from a wide variety of cyber assessment tools and Big Data Analytics * Assist in analysis tool development, configuration, implementation and use Analyze cyber-threat intelligence (e.g. actors, tools, exploits, malware, etc.) and determine TTPs used by threat-actors * Analyze security events and data feeds for event detection, correlation from monitoring solutions, conduct triage and classify the output using automated systems for further investigation * Assist in the discovery of cyber vulnerabilities and the investigation of global cyber security incidents * Develop cyber protection improvement recommendations that support the remediation and protection of systems * Analyze and report on cyber-threats based on assessment and all-source intelligence * Translate analytical findings into security "use cases" that can be implemented within available surveillance capabilities * Provide detailed and accurate technical reporting of analysis results in the form of PowerPoint presentations and/or Word documents, as well as oral briefings on complex technical subjects attuned to senior management, technical, or non-technical audiences * Travel: Up to 25% * Must be a U.S. Citizen * An active DoD Secret clearance is required to perform this work. Candidates are required to have an active Secret clearance upon hire, and the ability to maintain this level of clearance during their employment. Education Requirements: Master's Degree or 10+ years of experience in a cyber-related field is required. Desired Skills: * One or more current certifications equivalent to the following: Offensive Security Certified Professional (OSCP), SANS GIAC Penetration Tester (GPEN), SANS GIAC Certified Incident Handler (GCIH), SANS GIAC Web Application Penetration Tester (GWAP), SANS GIAC Certified Intrusion Analyst (GCIA) * Practical knowledge of high-level scripting/programming language (e.g. Python, Pearl, PowerShell, etc.) to extract, de-obfuscate, or otherwise manipulate malware-related data * Proficient with forensic analysis tools and techniques to identify malware technical indicators of compromise and perform triage * Possess excellent oral and written communication skills and critical thinking abilities * Capable of working independently and within teams to solve complex problems * Able to work across multiple organizations, cultures and service providers to pull together actionable information and management information * Practical knowledge of Splunk policies, filters and rules to improve event analysis and data correlation * Have 5+ years of penetration testing, incident response, malware analysis, reverse engineering, or other similar work experience * Knowledge of Windows and Unix/Linux Operating Systems * Ability to perform analysis of network traffic and protocols * Background or experience in digital forensics People First. Technology Always. PeopleTec, Inc. is an employee-owned small business founded in Huntsville, AL that provides exceptional customer support by employing and retaining a highly skilled workforce. Culture: The name "PeopleTec" was deliberately chosen to remind us of our core value system - our people. Our company's foundation was built on placing our employees and customers first. With an award-winning atmosphere, we have matured into a company that boasts the best and brightest across multiple technical fields. Career: At PeopleTec, we value your long-term goals. Whether it's through our continuing-education opportunities, our robust training programs, or our "People First" benefits package, PeopleTec truly believes that our best investments are our people. Come Experience It. EOE/Minorities/Females/Veterans/Disabled PeopleTec, Inc. is an Equal Employment Opportunity employer and provides reasonable accommodation for qualified individuals with disabilities and disabled veterans in its job application procedures. If you have any difficulty using our online system and you need an accommodation due to a disability, you may use the following email address, and/or phone number (256.319.3800) to contact us about your interest in employment with PeopleTec, Inc. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, genetic information, citizenship, ancestry, marital status, protected veteran status, disability status or any other status protected by federal, state, or local law. PeopleTec, Inc. participates in E-Verify. Peopletec Huntsville AL

Cyber Threat Hunter/ Intel Analyst

CGI Group Inc.