TMC Technologies
CTI Cybersecurity Analyst - Mid with Security Clearance
TMC Technologies, Huntsville, Alabama, United States, 35824
CTI Cybersecurity Analyst - Mid with Security Clearance
TMC Technologies is in search of a mid-level Cybersecurity Analyst to join the FBI's ESOC Cyber Threat Intelligence (CTI) Team. The CTI Team is responsible for monitoring and analyzing external cyber threat data to provide insights and actionable intelligence about potential cyber threats. The candidate must be a US citizen and possess a minimum of an active Top Secret clearance with Sensitive Compartmented Information (SCI) eligibility to start due to federal contract requirements. This position is in support of a newly awarded contract. Responsibilities Monitor computer networks for security issues. Investigate security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs. Conduct analysis, confirm intrusion information, and create a forensically sound duplicate of the files. Decrypt data and provide technical summaries and input. Examine recovered data for relevant information and perform dynamic analysis, including timeline, statistical, and file signature analysis. Perform real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs).
Qualifications / Requirements
US Citizenship and active Top Secret clearance with SCI eligibility required Minimum of 5 years of relevant experience required Experience with identifying indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs) used by attackers required Expertise in established cyber threat intelligence frameworks, such as MITRE ATT&CK required Splunk experience required Experience with open-source intelligence (OSINT) collection methods and tools preferred Bachelor's Degree required Preferred certifications include: GIAC Cyber Threat Intelligence (GCTI); Microsoft Sentinel
We are equal opportunity/affirmative action employers, committed to diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, disability, or protected veteran status, or any other protected characteristic under state or local law. Job Details Seniority level: Mid-Senior level Employment type: Full-time Job function: Information Technology Industries: IT Services and IT Consulting
Were unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI. #J-18808-Ljbffr
TMC Technologies is in search of a mid-level Cybersecurity Analyst to join the FBI's ESOC Cyber Threat Intelligence (CTI) Team. The CTI Team is responsible for monitoring and analyzing external cyber threat data to provide insights and actionable intelligence about potential cyber threats. The candidate must be a US citizen and possess a minimum of an active Top Secret clearance with Sensitive Compartmented Information (SCI) eligibility to start due to federal contract requirements. This position is in support of a newly awarded contract. Responsibilities Monitor computer networks for security issues. Investigate security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs. Conduct analysis, confirm intrusion information, and create a forensically sound duplicate of the files. Decrypt data and provide technical summaries and input. Examine recovered data for relevant information and perform dynamic analysis, including timeline, statistical, and file signature analysis. Perform real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs).
Qualifications / Requirements
US Citizenship and active Top Secret clearance with SCI eligibility required Minimum of 5 years of relevant experience required Experience with identifying indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs) used by attackers required Expertise in established cyber threat intelligence frameworks, such as MITRE ATT&CK required Splunk experience required Experience with open-source intelligence (OSINT) collection methods and tools preferred Bachelor's Degree required Preferred certifications include: GIAC Cyber Threat Intelligence (GCTI); Microsoft Sentinel
We are equal opportunity/affirmative action employers, committed to diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, disability, or protected veteran status, or any other protected characteristic under state or local law. Job Details Seniority level: Mid-Senior level Employment type: Full-time Job function: Information Technology Industries: IT Services and IT Consulting
Were unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI. #J-18808-Ljbffr