Threat Intelligence Analyst

Jacobs Engineering Arlington , TX 76004

Posted 2 months ago

"Jacobs National Security Solutions(NSS) provides world-class IT network and service management capabilities;cutting edge cyber threat awareness and cybersecurity solutions; innovativeweb- and software applications development; and advanced data analytics formajor clients in the Intelligence Community, Department of Defense, and FederalCivilian Agencies.

Our forward thinking solutions deliver an integrated approach to IT networkdesign and management, full lifecycle IT service management, IT servicedelivery, asset management, logistics and procurement, and vendormanagement. We leverage the expertise and passion of our employees toconduct identity and access management, penetration testing, and vulnerabilityassessments for our nation's most closely guarded agencies and networks. OurCyber Security Operations Centers ensure safe, effective network operations for

Federal clients while our data scientists are helping stop illegal acts beforethey can endanger Americans or our way of life.

Jacobs promotes a culture ofoperational excellence to create a safer, smarter, and more connected worldwhile upholding the highest standards of compliance, quality and integrity.

We continue to thrive and need yourtalent and motivation to help propel us farther, faster."

Jacobs is seekinga Threat Intelligence Analyst for the Arlington, Virginia office. Duties willinclude:

  • The Threat IntelligenceAnalyst for the SOC will monitor open and restricted sources of information aswell as consult with other departments, agencies, and peers.

  • The position alsorequires cultivating relationships with the aim of gathering intelligencerelevant to the environment and its periphery.

  • The Analyst willprovide cyber threat analysis and reporting to support SOC and the program'ssituational awareness.

  • This person is a memberof a high-tech Security Operations Center and will actively monitor securitythreats and risks, provide in-depth threat analysis, and evaluate securityincidents.

  • The Analyst willutilize the latest in security technology to assist in incident response.

  • Minimum Qualifications:

  • Associateof Science degree in Information Technology, IT Security, Network SystemsTechnology or related field or equivalent experience plus four (4) to seven (7)years of directly related experience or any equivalent combination ofeducation, experience, training and certifications.

Ability to work under tightdeadlines

  • Excellentanalytic abilities and relevant experience

  • Strongability to think creatively when approaching issues

  • Strongcritical thinking and problem solving skills

  • Must be able to obtain Public Trustlevel clearance. (SF-85 and SF-86 submissionrequired)

  • Must have certifications in thefield of information security from a respectable security organization

Desirable certifications include, but not limited to: FOR578 (Cyber ThreatIntelligence), GCIH, GCIA, Security , Network , CEH, CISSP, CCNA (Security)or equivalent Certifications

  • Candidates must be willing to work aMon-Fri, with shifts between 6:00am to 9:00pm in the SOC operational supportenvironment. Once a candidate is selected, their shift will be determined basedon the business need and current shift opening and may include a requirement torotate shifts on a periodic basis (e.g. every three months)

  • Four (4) years of directly relatedexperience

  • Self-motivated and able to work inan independent manner

  • Strongverbal presentation skills

  • Excellent oral communication skills

  • Demonstratedability to write clear, concise text


Physical Requirements:

Most work will be done at a desk or computer.

Work Environment:

General Office environment. The work environmentis fast-paced and sometimes involves extreme deadline pressures. The nature ofthe work requires a high degree of teamwork and cooperation with other membersof the staff as well as individuals across the Company and Customers.

Equipment & Machines:

General office equipment including PC/laptop,Fax, Copiers, Shredder, Printers, Telephone, and other miscellaneous officeequipment.


Attendance is critical at all times. Must be ableto work a 40-hour workweek, normally Monday through Friday. However,times and days may vary depending on business requirements. Needs to beavailable to work overtime during critical peaks and be available to meet lastminute requests for overtime should the situation occur.

Other Essential Functions:

Must be able to communicateeffectively both verbally and in writing

Grooming and dress must beappropriate for the position and must not impose a safety risk/hazard to theemployee or others. Must put forward a professional behavior that enhancesproductivity and promotes teamwork and cooperation. Must be able to interfacewith individuals at all levels of the organization both verbally and inwriting. Must be well-organized with the ability to coordinate and prioritizemultiple tasks simultaneously. Must work well under pressure to meetdeadline requirements. Must be willing to travel as needed. Must take and passa drug test and background check as well as a motor vehicle records check. Mustbe a US citizen.

See if you are a match!

See how well your resume matches up to this job - upload your resume now.

Find your dream job anywhere
with the LiveCareer app.
Download the
LiveCareer app and find
your dream job anywhere

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Cybersecurity Engineer Threat Hunting

GM Financial

Posted 6 days ago

VIEW JOBS 11/15/2018 12:00:00 AM 2019-02-13T00:00 Overview The Cybersecurity Engineer is responsible for developing, deploying, monitoring, tuning, evaluating, reporting and maintaining systems and procedures; and to identify and mitigate threats to the corporate network, corporate assets, and corporate users. This team member will identify core requirements, design and implement security technologies, and work with stakeholders to perform ongoing tuning and alerting on those technologies. Security technologies may include, but are not limited to: Data Loss Prevention (DLP), Security Incident Event Management (SIEM), User Behavior Analytics, Host Intrusion Prevention (HIPS), and Web/Email Gateway. This team member will be responsible for both technical implementation of systems and communication of security requirements to management and security leadership. Additionally, this team member will be responsible, as necessary, with assisting in investigations into security threats. Responsibilities JOB DUTIES * Perform analytics on security tool and operating system events * Analyze threat intelligence sources to identify and understand attacker tactics, techniques and procedures. Identify points of coverage and visibility gaps, developing and implementing detection capabilities as required * Participate in emergency response team activities for responding to various security incidents * Develop reporting and alerting based upon correlation rules in a SIEM solution. * Prepare technical requirements and standards * Develop detailed proposals and plans for new information security systems that would enhance or enable new capabilities for network or host system * Perform other duties as assigned * Conform with all corporate policies and procedures Qualifications Knowledge * Detail oriented * Local and wide area networking concepts, principles and protocols * Advanced knowledge in Infrastructure design and management * Working knowledge of management processes such as personnel administration, planning and budgeting * Strong working knowledge of Intel platforms, iSeries and pSeries servers * Advanced understanding of IT Service Management (ITSM) best practices and processes * Experience with UML Design Tools * Advanced knowledge of TCP/IP, OSI model and imp subnetting * High level understanding of technology infrastructure, security concepts and platforms * Demonstrated success in project management * Advanced knowledge of IBM pSeries hardware, operating systems and TSM backup infrastructure * Advanced knowledge of the OSI model and security that is associated with each layer * Understanding of routing and switching protocols as they relate to load balancing * Strong understanding of application layer protocols including HTTP, SSH, SSL, and DNS * Knowledge and stay abreast on the latest security and privacy legislation, regulations, advisories, alerts and vulnerabilities * Knowledge of IT security processes and controls as well as IT infrastructure and networking technical knowledge * Proven expertise developing custom rule sets for tools to identify specific attacks and exploits based on feedback and requirements from business stakeholders including Compliance and Legal Counsel * Cybersecurity related certifications strongly preferred Skills * Ability to think strategically and make collaborative decisions * Ability to apply structured analysis methods to various types of data to establish trends, determine variability and business impact * Communicates quickly, clearly, concisely, appropriately, and intelligently * Foster open communication, speaks with impact, listens to others, and writes effectively * Experience with alternate management methods using SSH, serial connections, and the command-line interface TMSH * Ability to effectively negotiate with vendors on upgrades and acquisitions * Effective planning, time management, negotiation, and delegation skills * Expert level IT security processes and controls knowledge as well as IT infrastructure and networking technical knowledge * Ability to approach problems with an open-mind and create new and innovative ideas and methods * Advanced technical writing * Experience in documentation tools such as Visio and Microsoft Office products * Advanced information security standards/frameworks (ie, NIST Cybersecurity Framework, ISO 27001) skills * Advanced experience with Network and VLAN segmentation * Strong analytical skills * Ability to approach problems with an open-mind, use existing information and resources * Creative, Innovative, problem-solving and maximizing your potential to solve problems and improve methods * Think positively when faced with obstacles, build on others ideas, think logically and intuitively Education * Bachelor's Degree or equivalent experience strongly preferred Experience * Minimum of 1-5 years of experience in large and complex business environments with a successful track record working directly with senior level management with at least 1 year of experience in one or more of the following domains: Cybersecurity, Information Security, Network Engineering, or Network Operations, Information Technology, Application Development preferred Work Conditions * Normal office environment 0-20% travel may be required * Some after-hours work and periodic 24x7 on-call support will be required GM Financial Arlington TX

Threat Intelligence Analyst

Jacobs Engineering