We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.

Job posting has expired

#alert
Back to search results

Cyber Intelligence Analyst

Leidos Inc
United States, Virginia, Herndon
December 14, 2022

Description

Job Description:

Leidos has an opening in Northern Virginia for a Cyber Intelligence Analyst to support our TSA customer in their Security Operations Center.

The Cyber Intelligence Analyst will review threat data from various sources and perform cyber threat intelligence analysis, correlate actionable security events/campaigns from various sources, perform network traffic analysis using raw packet data, net flow, IDS, IPS, and custom sensor output as it pertains to the cyber security of communication networks. Conducts analysis providing indicators for enterprise defensive measures. Interfaces with external entities including law enforcement organizations, intelligence community organizations and other government agencies as required.

Primary Responsibilities

  • Conduct trending and correlation of various cyber intelligence sources for the purposes of indicator collection, shifts in TTPs, attribution and establishing countermeasures to increase cyber resiliency.

  • Conduct host-based and network-based forensics related to the identification of advanced cyber threat activities, intrusion detection, incident response, malware analysis, and security content development (e.g., signatures, rules etc.); and cyber threat intelligence.

  • Provide support to the Security Operations Center during incident response and threat hunting activities that includes cyber threat analysis support, research, recommending relevant remediation and mitigation.

  • Maintain and drive the development of new reports of Cyber Threat Intelligence analysis to peers, management, and customer teams for purposes of situational awareness and making threat intelligence actionable.

  • Provide support to the Security Operations Center during incident response and threat hunting activities that includes cyber threat analysis support, research, recommending relevant remediation and mitigation.

  • Conduct trending and correlation of various cyber intelligence sources for the purposes of indicator collection, shifts in TTPs, attribution and establishing countermeasures to increase cyber resiliency.

  • Normal working hours of 8:00am - 5:00pm, however actual hours may vary depending on mission requirements

Basic Qualifications

  • BS in IT, Computer Science, Cybersecurity or related field and 10+ years' related experience.

  • At least eight years of experience in overall intelligence analysis and at least six years of experience in cyber intelligence analysis. The two years of cyber intelligence experience should include host-based and network-based security monitoring solutions and recommendations or development of threat detection content.

  • GIAC Open Source Intelligence (or equivalent), GIAC Certified Intrusion Analyst (or equivalent), Certified Ethical Hacker (or equivalent) and Security + are required.

  • Experience manually and automatically ingesting cyber threat intelligence indictors directly related to a customer's unique environment.

  • Experience extrapolating indicators of compromise and relevant TTPs in order to apply them to new and existing cyber threat defense tools e.g., applying updates to IPS/IDS tools and SIEM content views.

  • Experience with cyber threat intelligence platforms such as Analyst1 or other applicable platforms.

  • Experience reviewing IOCs and TTPs from classified sources and extrapolating them for consumption within an unclassified environment for direct implementation into cyber defense tools.

  • Experience reviewing and validating applied IOCs as part of a signature maintenance process to ensure applied signatures are validated against scaling risk models associated with established threat actors.

  • Experience with correlating IOCs and TTPs of new, emerging and established cyber threats to stay ahead of advanced cyber threat actors and applying this knowledge to applicable defense in depth models associated with a customer's unique cyber landscape.

  • Extensive experience and proficiency in developing and presenting, both verbally and in writing, highly technical information and presentations to non-technical audiences at all levels of the organization. Audiences for this information include, but are not limited to, senior executives at TSA and other agencies. Experience collecting intelligence, analyzing seemingly unrelated intelligence, and extracting meaning or relevance from the data. and creating relevant intelligence reports.

  • Working knowledge of cyber intelligence threats, TTPs etc.

  • Strong written and verbal communication skills and must be capable of the understanding, documenting, and communicating technical issues in a non-technical manner

  • Working knowledge of Microsoft Word, Project, PowerPoint, and Excel for the purpose of documentation and presentation of deliverables

  • Solid understanding of MITRE ATT&CK Framework and applicable analytic models such as the Diamond Model

Preferred Qualifications

  • CISSP certification

  • Previous DOD, IC or Law Enforcement Intelligence or Counterintelligence Training/Experience.

  • Knowledge of Structured Analytic Techniques

  • Experience developing scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, or other type most appropriate for the task.

Pay Range:Pay Range $97,500.00 - $150,000.00 - $202,500.00

The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

(web-5bb4b78774-f7f6c)