DC3/JAPEC Cyber Threat Analyst

DC3/JAPEC Cyber Threat Analyst

11 Sep 2024
Maryland, Linthicum 00000 Linthicum USA

DC3/JAPEC Cyber Threat Analyst

Vacancy expired!

Description: The selected candidate will serve Program Analyst/Cyber Threat Analyst at the Defense Cyber Crime Center - Analytical Group (DC3-AG) in Linthicum, MD. The candidate will use their experience, knowledge, and analytical skills to support the Joint Acquisition Protection and Exploitation Cell (JAPEC) effort. The candidate will perform analytical research in a team environment focused on cyber threat actors/activity, author and review intelligence products by applying technical expertise, while also consulting and making recommendations for new solutions to cyber analytical issues as needed. Additionally, the candidate will be expected to collaborate with analysts from DC3-AG, analysts and JAPEC stakeholders outside of DC3, various other Intelligence Community agencies, and other Defense Criminal Investigative Organizations (AFOSI, CID, DCIS) on a regular basis. The candidate will rely heavily on their experience serving in past intelligence analyst roles in DoD, Computer Network Operations, Law Enforcement/Counterintelligence, or Intelligence Community mission focused organizations. The selected candidate should be comfortable writing documents up to 30 pages in length.Only candidates with a current TS/SCI clearance will be considered.Candidates with CI Poly preferred, but not necessary to start.Basic Qualifications: BA/BS degree in Information Technology or Information Security, Computer Science, Intelligence Studies, Cyber Security or another related field of study or equivalent 3+ years performing technical cyber threat and/or all-source intelligence analysis Strong knowledge of general intelligence analysis principles governing the collection and evaluation of raw intelligence as well as the production and publication of finished intelligence Strong knowledge of business intelligence and analytics, including supply chain risks Strong knowledge of Cyber Threat Intelligence (CTI) principles to include indicators of compromise (IOC) types, indicator pivoting and indicator attribution strength Strong understanding of US Intelligence Community and how cyber intelligence organizations work together for purposes of conducting cyber threat analysis Strong proficiency in report writing Strong or Intermediate ability to apply formal intelligence analysis methods, develop hypothesis, prove/disprove relationships, always ask why, defend analysis, and apply attribution to cyber threat activity. Must be able to identify analytic bias. Intermediate ability to present technical information and analysis to groups (Candidate will potentially be required to brief up to 50 persons on a quarterly basis and smaller groups of up to 10 persons on a weekly basis); ability to translate technical information into layman's terms Strong ability to conduct Incident Report Analysis on incidents reported under applicable DFARS procedures Strong familiarity with the damage assessment process, specifically regarding data compromised as a result of adversary intrusions into contractor networks. Strong ability to provide analysis supporting assessments of the overall impact of data loss on current and future USAF weapons programs, scientific and research projects, and warfighting capabilities (in accordance with guidance as set forth in AFI 33-200) Self-starter with the ability to proactively engage and develop relationships with intrusion set subject matter experts and analyst counterparts across the US Intelligence and Law Enforcement communitiesDesired Skills: Familiarity with DoD Damage Assessment Management Office (DAMO) Program guiding documents and mission (DFARS Procedures, Guidance, and Information (PGI) 204.7303-4 DoD damage assessment activities) Formal training as an intelligence analyst in any discipline – graduate of US Govt intelligence analysis course: CAC, IBC, Kent School, IC 101, Analysis 101, Army, Navy, Air Force, etc Certifications (any): CISSP, CEH, Security+, SANS certification(s), Network+, CCNA Advanced Data Visualization proficiency leveraging COTS/GOTS tools Understanding/ability to correlate data and research using open source repositories (ex. VirusTotal, Domaintools, Threatminer, etc.) Any type of Cyber related Law Enforcement or Counterintelligence experience Existing Subject Matter Expert of Advanced Persistent Threat activity Analyst experience in a Federal Cyber Center or corporate computer incident response team Some understanding of systems engineering and familiarity with major defense programsBASIC QUALIFICATIONS:job.QualificationsLockheed Martin is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.Join us at Lockheed Martin, where your mission is ours. Our customers tackle the hardest missions. Those that demand extraordinary amounts of courage, resilience and precision. They’re dangerous. Critical. Sometimes they even provide an opportunity to change the world and save lives. Those are the missions we care about.As a leading technology innovation company, Lockheed Martin’s vast team works with partners around the world to bring proven performance to our customers’ toughest challenges. Lockheed Martin has employees based in many states throughout the U.S., and Internationally, with business locations in many nations and territories.EXPERIENCE LEVEL:Experienced Professional

Job Details

  • ID
    JC2695438
  • State
  • City
  • Full-time
  • Salary
    N/A
  • Hiring Company
    Lockheed Martin
  • Date
    2019-09-12
  • Deadline
    2019-11-10
  • Category

Jocancy Online Job Portal by jobSearchi.