Vacancy expired!
Description
Job Description:
Leidos Enterprise & Cyber Solutions Defense operation is seeking a Cyber Threat Intel Analyst to support our Army Corps of Engineers IT program.
Location: Vicksburg, MS, or Hillsboro, OR (preferred). Alternatively the following locations may be available for the right candidate: Hanover NH, Urbana Champaign IL, Philadelphia PA, Pentagon DC, Atlanta GA, Fort Worth TX. Telework from one of these locations may also be available with manager authorization.
Clearance: Active DOD Top Secret is required with ability to obtain Top Secret/SCI.
Overview:
In this role, you will perform as the Technical SME in area of Cyber Threat Intelligence. You will incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infestation.
You will be responsible for identifying threat actor tactics, techniques and procedures and based on indicators develops custom signatures and blocks. This role will require you to interact with the ACE-IT CIRT for incident response, recovery, and prevention. Additionally, you will interact with the ACE-IT SOC and NOC personnel to maximize cyber threat prevention measures, enhance audit and logging standards, and enforce and monitor effective cyber security policies and configurations and security event management within the logging and SIEM infrastructure.
A successful candidate will:
Demonstrate experience implementing the core Security Intelligence Center (SIC) concepts (SOC vs. SIC, Cyber Kill Chain, APT)
Possess a strong understanding of the enterprise network and how each component contributes to Security Intelligence
Possess a strong understanding of the tools & techniques necessary to efficiently identify trends and extract indicators from large data sources
Understand and employ the Cyber Kill Chain
Demonstrate knowledge of the importance of mitigating adversaries at each step of an intrusion
Demonstrate ability to identify and create mitigations for the various steps of the Cyber Kill Chain
Recognize specific intrusion techniques used by APT adversaries
Recognize what you'll need to know to prevent or identify APT intrusions
Understand key networking concepts relevant to the Cyber Security and Threat Intelligence processes
Understand key forensics and incident response concepts critical to the Cyber Network Defense (CND) processes
Understand analysis techniques when dealing with various storage media, host data and network data with various categories of electronic evidence including media, email, and networks
Identify network architectures and select network components
Understand concepts of packet analysis
Examine different methods of policy creation, implement a security policy and create a policy document
Navigate the command line using specific expressions to manipulate data
Handle and organize disparate data about detections, attacks, and attackers
Demonstrate ability to use discovery techniques and vet new intelligence
Build actionable intelligence from data
Required Qualifications: