Yesterday
Top Secret/SCI
Unspecified
Unspecified
IT - Security
Springfield, VA (On-Site/Office)
ManTech is seeking a motivated, career and customer-oriented Cyber Threat Analyst, Principal to join our team in the Springfield, VA area.
The Cyber Threat Cell Lead performs as the technical expert for the NRO Cybersecurity Operations Squadron (COS) Threat Cell team. The COS Threat Cell Lead provides direction, leadership and mentorship to the team that conducts research, analysis, and correlation across a wide variety of all source cyber threat data sets, and proactive threat hunts. The individual should have excellent customer service, communications, presentation, analytical and troubleshooting skills along with the ability to work under pressure. It is a key requirement of this position to be able to quickly and efficiently resolve security issues while maintaining high levels of operational metrics.
Responsibilities include, but are not limited to:
Basic Qualifications:
Preferred Qualifications:
Security Clearance Requirements:
Physical Requirements:
The Cyber Threat Cell Lead performs as the technical expert for the NRO Cybersecurity Operations Squadron (COS) Threat Cell team. The COS Threat Cell Lead provides direction, leadership and mentorship to the team that conducts research, analysis, and correlation across a wide variety of all source cyber threat data sets, and proactive threat hunts. The individual should have excellent customer service, communications, presentation, analytical and troubleshooting skills along with the ability to work under pressure. It is a key requirement of this position to be able to quickly and efficiently resolve security issues while maintaining high levels of operational metrics.
Responsibilities include, but are not limited to:
- Lead, train, and equip team members to research, analyze, counter cyber threat activities
- Lead and assign personnel on threat hunts
- Conduct proactive threat hunts to uncover previously undetected adversary behavior, performing in-depth host and network log analysis, and delivering systematic threat assessments.
- Review operational detection mechanisms to assess security posture, recommending new/custom signatures to counter prospective threats and enable future threat hunts.
- Manage cyber intelligence requirements and focusing cyber intelligence collection efforts. Identifying emerging cyber technologies, capabilities, or weapons which pose a threat to US or Allied systems.
- Collect and analyzing all-source threat intelligence to identify adversary capabilities and intent, driving resource allocation for enterprise cyber defense operations.
- Produce comprehensive cybersecurity reports, providing sourced and summarized threat intelligence, outlining threat hunt findings and limitations, and presenting recommendations to system owners, cyber defenders, and policy makers.
- Coordinate with the U.S. Intelligence Community and private sector to exchange threat intelligence, emerging trends, and effective countermeasures.
- Research known adversarial Tactics, Techniques and Procedures (TTPs) to identify foundational components, isolate associated host or network events, and enable threat mitigation, detection, and response.
- Create custom cybersecurity dashboards to monitor host and network activity, enabling rapid identification of successful and unsuccessful intrusion attempts.
- Perform analysis, correlation, and attribution of incidents to Advanced Persistent Threat (APT) groups.
- Ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies.
- Perform research and analysis of APT infrastructure and malicious binaries, external cyber threat intelligence reporting and production.
- Collaborate across the U.S. IC and private sector regarding observed threats, intrusion attempts, and successful compromises to network infrastructure, applications, and operating systems.
- Disseminate timely Indicators of Compromise (IOCs) and warnings of cyber threat activity against U.S. service members and Department of Defense (DoD)-owned and operated hosts and networks.
Basic Qualifications:
- Bachelor's degree or 4+ additional years of experience in lieu of degree
- 7+ years of cyber experience
- Experience with security technology or discipline such as Incidents and Warnings Management, Cybersecurity Operations, Cybersecurity Engineering.
- IAT Level II (GSEC, Security+, SSCP, or CCNA-Security) certification required or abilty to obtain within 6 months of hire
Preferred Qualifications:
- Ability to use MS Office, SIEM tools, Analytical and Critical Thinking Skills, Interpersonal and People Skills, Oral and Written Communication Skills, Organizational Skills, Project Management Ability, Public Speaking Skills.
- Ability to effectively interact with various levels of senior management is necessary
- Ability to make decisions and resolve problems effectively - Seek out information and data to evaluate, prioritize and formulate best solution or practice
- Ability to multi-task, work independently and as part of a team, share workloads, and deal with sudden shifts in project priorities
- CNDSP-A (GCIA, GCIH, or CEH) or CNDSP-IR (GCIH, CSIH, or CEH) certification
Security Clearance Requirements:
- Active TS/SCI w/ Polygraph
Physical Requirements:
- Must be able to remain in a stationary position 50%
- Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
- The person in this position frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations
- Occasionally ascends/descends a ladder to install and/or maintain network transport material.
group id: RTX14564a