ManTech is seeking a motivated, career and customer-oriented Cyber Threat Analyst, Senior to join our team in the Springfield, VA area.
The Cyber Threat Cell Lead performs as the technical expert for the NRO Cybersecurity Operations Squadron (COS) Threat Cell team. The COS Threat Cell Lead provides direction, leadership and mentorship to the team that conducts research, analysis, and correlation across a wide variety of all source cyber threat data sets, and proactive threat hunts. The individual should have excellent customer service, communications, presentation, analytical and troubleshooting skills along with the ability to work under pressure. It is a key requirement of this position to be able to quickly and efficiently resolve security issues while maintaining high levels of operational metrics.
Responsibilities include, but are not limited to:
Lead, train, and equip team members to research, analyze, counter cyber threat activities
Lead and assign personnel on threat hunts
Conducting proactive threat hunts to uncover previously undetected adversary behavior, performing in-depth host and network log analysis, and delivering systematic threat assessments.
Reviewing operational detection mechanisms to assess security posture, recommending new/custom signatures to counter prospective threats and enable future threat hunts.
Managing cyber intelligence requirements and focusing cyber intelligence collection efforts. Identifying emerging cyber technologies, capabilities, or weapons which pose a threat to US or Allied systems.
Collecting and analyzing all-source threat intelligence to identify adversary capabilities and intent, driving resource allocation for enterprise cyber defense operations.
Producing comprehensive cybersecurity reports, providing sourced and summarized threat intelligence, outlining threat hunt findings and limitations, and presenting recommendations to system owners, cyber defenders, and policy makers.
Coordinating with the U.S. Intelligence Community and private sector to exchange threat intelligence, emerging trends, and effective countermeasures.
Researching known adversarial Tactics, Techniques and Procedures (TTPs) to identify foundational components, isolate associated host or network events, and enable threat mitigation, detection, and response.
Creating custom cybersecurity dashboards to monitor host and network activity, enabling rapid identification of successful and unsuccessful intrusion attempts.
Performing analysis, correlation, and attribution of incidents to Advanced Persistent Threat (APT) groups.
Ensuring the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies.
Performing research and analysis of APT infrastructure and malicious binaries, external cyber threat intelligence reporting and production.
Collaborating across the U.S. IC and private sector regarding observed threats, intrusion attempts, and successful compromises to network infrastructure, applications, and operating systems.
Disseminating timely Indicators of Compromise (IOCs) and warnings of cyber threat activity against U.S. service members and Department of Defense (DoD)-owned and operated hosts and networks.
Basic Qualifications:
7+ years of related experience.
B.S. or 4+ additional years of experience
Experience shall be in a related security technology or discipline such as Incidents and Warnings Management, Cybersecurity Operations, Cybersecurity Engineering.
IAT Level II (GSEC, Security+, SSCP, or CCNA-Security) certification required or abilty to obtain within 6 months of hire
Preferred Qualifications:
Ability to handle stress and work well under pressure and deal with ambiguity.
Ability to use MS Office, SIEM tools, Analytical and Critical Thinking Skills, Interpersonal and People Skills, Oral and Written Communication Skills, Organizational Skills, Project Management Ability, Public Speaking Skills.
Ability to effectively interact with various levels of senior management is necessary
Ability to make decisions and resolve problems effectively - Seek out information and data to evaluate, prioritize and formulate best solution or practice
Ability to multi-task, work independently and as part of a team, share workloads, and deal with sudden shifts in project priorities
CNDSP-A (GCIA, GCIH, or CEH) or CNDSP-IR (GCIH, CSIH, or CEH) certification
Security Clearance Requirements:
Active TS/SCI w/ Polygraph
Physical Requirements:
Must be able to remain in a stationary position 50%
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
The person in this position frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations
Occasionally ascends/descends a ladder to install and/or maintain network transport material.
#gl-soc
S:SKINTIAGP2