Threat Analyst w/Splunk- Top Secret Clearance

Veterans Inc.
Clarksville, United States of America
6 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Compensation
$ 132K

Job location

Remote
Clarksville, United States of America

Tech stack

Cloud Computing Security
Computer Security
Computer Networks
Intrusion Detection and Prevention
Open Source Technology
Security Information and Event Management
Enterprise Software Applications
Cloud Platform System
Mitre Att&ck
Cyber Threat Analysis
Cybercrime
Splunk

Job description

  • Be a key part of the Indications and Warnings team.
  • Leverage open-source, proprietary/vendor, and classified reporting to closely track advanced persistent threat actor activity.
  • Perform pattern, trend, and behavior analysis, as well as other specialized analysis techniques to identify malicious cyber threat activity targeting DOS information, systems and personnel.
  • Maintain records to catalog and track malicious cyber threat activity targeting DOS information, systems and personnel.
  • Identify Indicators of Compromise (IOCs) present on an Enterprise network through the use of a SIEM and other security tools and logs.
  • Liaise with members of the Intelligence Community (IC).
  • Acts as the fusion analysis cell within Cyber Threat Analysis Division (CTAD).
  • Monitor geopolitical developments, emerging technologies and threats to assess their impact on the cyber threat landscape.
  • Author and present on short notice cyber threat-focused analyses to technical and non-technical audiences including but not limited to policymakers and security practitioners.
  • Correlate threat intelligence with internal security events to identify patterns and potential vulnerabilities
  • Role will require up to 10% travel to foreign and domestic locations.

Requirements

  • A Bachelor's degree and 9 years of relevant experience. An additional 4 years of experience may be substituted in lieu of the degree requirement.
  • Must either possess and maintain one of the following professional certifications:
  • CCNA-Security, CND, CySA+, GICSP, GSEC, Security+ CE, SSCP.
  • Experience with Splunk SIEM and Analyst1 threat intelligence platform.
  • Experience leveraging the MITRE ATT&CK matrix or other threat models (e.g. Lockheed Martin Kill Chain, Diamond Model).
  • Knowledge or experience tracking advanced persistent threats (APTs). Knowledge or experience pivoting from IOCs to identify related infrastructure.
  • Familiarity with threat detection tools
  • Knowledge of cloud security and threats targeting cloud environments an understanding of network protocols and systems
  • Experience developing predictive models to anticipate future cyber threats and recommending preemptive measures
  • Experience working in a fast-paced classified environment with government, military or Intelligence Community environments.
  • Experience providing intelligence support prior to, or during cyber incidents; this may include attribution analysis, adversary profiling based on known tactics, techniques and procedures or the ability to correlate disparate events using industry, academic or government methodologies or best practices.
  • Experience assisting in post-incident reviews to identify lessons learned and improve threat detection capabilities
  • Demonstrably excellent written communication skills with the ability to convey highly technical topics in an analytic fashion; familiarity or experience with ICD-203 Intelligence Community tradecraft standards and finished intelligence product lines is desirable.
  • Ability to work independently as well as with a team of other analysts.
  • Active U.S. Passport and the ability to travel up to two weeks at a time, both foreign and domestically.
  • U.S citizenship required.
  • An active Top Secret security clearance with SCI eligibility.

Benefits & conditions

$132,000.00

Apply for this position