ECS
Cybersecurity Threat Intelligence Analyst - Senior
ECS, Washington, District of Columbia, us, 20022
Cybersecurity Threat Intelligence Analyst - Senior
Join to apply for the
Cybersecurity Threat Intelligence Analyst - Senior
role at
ECS Cybersecurity Threat Intelligence Analyst - Senior
16 hours ago Be among the first 25 applicants Join to apply for the
Cybersecurity Threat Intelligence Analyst - Senior
role at
ECS Get AI-powered advice on this job and more exclusive features. Job Description
ECS is seeking a Responsible for development and leadership of the CTI team establishment of the mission, maturity, optimizing, task management, and maintenance of threat intelligence processes and documentation. Identify threat tactics, methodologies, gaps, and shortfalls. Provide subject matter expertise to the development of cyber operations specific indicators. Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities. Assist in the identification of intelligence collection shortfalls. Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets Monitor open-source websites for hostile content directed towards organizational or partner interests. Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements. Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies). Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations. Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations. Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities. Report intelligence-derived significant network events and intrusions. Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up to date.
Job Description
ECS is seeking a
Sr. Cybersecurity Threat Intelligence Analyst
to work in our
Washington, DC
office.
Please Note:
This position is contingent upon additional funding.
Responsible for development and leadership of the CTI team establishment of the mission, maturity, optimizing, task management, and maintenance of threat intelligence processes and documentation. Identify threat tactics, methodologies, gaps, and shortfalls. Provide subject matter expertise to the development of cyber operations specific indicators. Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities. Assist in the identification of intelligence collection shortfalls. Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets Monitor open-source websites for hostile content directed towards organizational or partner interests. Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements. Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies). Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations. Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations. Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities. Report intelligence-derived significant network events and intrusions. Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up to date.
Salary Range:
$107,000 - $120,100
Required Skills
General Description of Benefits
7+ years of experience in identifying potential and real threats to computing infrastructure and data and providing risk mitigation strategies and recommendations. Review prioritized intelligence requirements (PIR) for additions, deletions, and changes in priority. Ensure alignment with decision made by USCB leadership on program objectives, scope, and escalation criteria. Research, analyze, and disseminate classified cyber threat briefings, reports, and information in accordance with all relevant controls for handling and disseminating classified information. Strong written and verbal communication skills. Experience using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches. Experience using multiple analytic tools, databases, and techniques (e.g., Analyst’s Notebook, Maltego, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.). Ability to communicate and brief complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless). Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes. Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. Bachelor’s degree or equivalent work experience. 7+ years’ cyber threat intelligence experience focused on Cyber operations fundamentals, operational intelligence analysis, and reporting. Certifications addressing advanced IDS concepts, applications protocols, concepts of TCP/IP and the link layer, DNS, fragmentation, IDS fundamentals and initial deployment, IDS rules, IPv6, network architecture and event correlation, network traffic analysis and forensics, packet engineering, silk and other traffic analysis tools, TCP, Tcpdump filters, UDP and ICMP, focus on new attack vectors (emphasis on cloud computing technology, mobile platforms and tablet computers), new vulnerabilities, existing threats to operating environments, information systems audit process, IT governance and management. Active TS/SCI clearance.
Desired Skills
Knowledge of types and associative characteristics of Cyber Threat Actors (i.e., Nation-State, Cybercriminals, Hacktivists, etc.) Knowledge of the Cyber Threat Intelligence Cycle. Experience with the establishment, configuration, and/or development of a Threat Intelligence Platform (i.e., Anomali, ThreatConnect, etc.) Experience with Anti-Malware component software (i.e., Microsoft Defender). Experience with Security Information and Event Management (SIEM) systems. Experience conducting non-attributable research and conducting research using deep web. Ability to define and characterize all pertinent aspects of the operational environment. Skill in developing or recommending analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. Knowledge of general Supervisory control and data acquisition (SCADA) system components. Knowledge of host-based security products and how those products affect exploitation and reduce vulnerability. Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP). Knowledge of how modern digital and telephony networks impact cyber operations. Experience identifying critical target elements, to include critical target elements for the cyber domain. Skill in identifying cyber threats which may jeopardize organization and/or partner interests.
ECS is an equal opportunity employer and does not discriminate or allow discrimination on the basis any characteristic protected by law. All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, or local jurisdiction law.
ECS is a leading mid-sized provider of technology services to the United States Federal Government. We are focused on people, values and purpose. Every day, our 3800+ employees focus on providing their technical talent to support the Federal Agencies and Departments of the US Government to serve, protect and defend the American People Seniority level
Seniority level Not Applicable Employment type
Employment type Full-time Job function
Job function Information Technology Industries IT System Data Services Referrals increase your chances of interviewing at ECS by 2x Get notified about new Cyber Security Analyst jobs in
Washington, DC . Reston, VA $70,000.00-$85,000.00 2 weeks ago Security Operations Center (SOC) Analyst - Mid
Washington, DC $120.00-$125.00 3 weeks ago Herndon, VA $90,000.00-$115,000.00 1 week ago Columbia, MD $55,000.00-$60,000.00 2 days ago Security Operations Center (SOC) Analyst
FBI Special Agent: Cybersecurity/IT Expertise
Arlington, VA $99,461.00-$128,329.00 1 week ago Junior Cybersecurity SIEM Monitoring Analyst
Information Security Analyst (SOC 2 Compliance)
Fairfax, VA $92,400.00-$115,000.00 4 weeks ago Security Operations Center (SoC) Analyst
Sterling, VA $70,000.00-$85,000.00 3 days ago Washington, DC $92,000.00-$130,000.00 3 weeks ago Bethesda, MD $70,000.00-$85,000.00 1 week ago Junior Cybersecurity Threat Intelligence Analyst
Security (SOC) Analyst, Secret Clearance Required
Herndon, VA $70,000.00-$76,000.00 2 weeks ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Join to apply for the
Cybersecurity Threat Intelligence Analyst - Senior
role at
ECS Cybersecurity Threat Intelligence Analyst - Senior
16 hours ago Be among the first 25 applicants Join to apply for the
Cybersecurity Threat Intelligence Analyst - Senior
role at
ECS Get AI-powered advice on this job and more exclusive features. Job Description
ECS is seeking a Responsible for development and leadership of the CTI team establishment of the mission, maturity, optimizing, task management, and maintenance of threat intelligence processes and documentation. Identify threat tactics, methodologies, gaps, and shortfalls. Provide subject matter expertise to the development of cyber operations specific indicators. Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities. Assist in the identification of intelligence collection shortfalls. Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets Monitor open-source websites for hostile content directed towards organizational or partner interests. Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements. Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies). Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations. Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations. Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities. Report intelligence-derived significant network events and intrusions. Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up to date.
Job Description
ECS is seeking a
Sr. Cybersecurity Threat Intelligence Analyst
to work in our
Washington, DC
office.
Please Note:
This position is contingent upon additional funding.
Responsible for development and leadership of the CTI team establishment of the mission, maturity, optimizing, task management, and maintenance of threat intelligence processes and documentation. Identify threat tactics, methodologies, gaps, and shortfalls. Provide subject matter expertise to the development of cyber operations specific indicators. Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities. Assist in the identification of intelligence collection shortfalls. Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets Monitor open-source websites for hostile content directed towards organizational or partner interests. Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements. Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies). Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations. Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations. Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities. Report intelligence-derived significant network events and intrusions. Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up to date.
Salary Range:
$107,000 - $120,100
Required Skills
General Description of Benefits
7+ years of experience in identifying potential and real threats to computing infrastructure and data and providing risk mitigation strategies and recommendations. Review prioritized intelligence requirements (PIR) for additions, deletions, and changes in priority. Ensure alignment with decision made by USCB leadership on program objectives, scope, and escalation criteria. Research, analyze, and disseminate classified cyber threat briefings, reports, and information in accordance with all relevant controls for handling and disseminating classified information. Strong written and verbal communication skills. Experience using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches. Experience using multiple analytic tools, databases, and techniques (e.g., Analyst’s Notebook, Maltego, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.). Ability to communicate and brief complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless). Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes. Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. Bachelor’s degree or equivalent work experience. 7+ years’ cyber threat intelligence experience focused on Cyber operations fundamentals, operational intelligence analysis, and reporting. Certifications addressing advanced IDS concepts, applications protocols, concepts of TCP/IP and the link layer, DNS, fragmentation, IDS fundamentals and initial deployment, IDS rules, IPv6, network architecture and event correlation, network traffic analysis and forensics, packet engineering, silk and other traffic analysis tools, TCP, Tcpdump filters, UDP and ICMP, focus on new attack vectors (emphasis on cloud computing technology, mobile platforms and tablet computers), new vulnerabilities, existing threats to operating environments, information systems audit process, IT governance and management. Active TS/SCI clearance.
Desired Skills
Knowledge of types and associative characteristics of Cyber Threat Actors (i.e., Nation-State, Cybercriminals, Hacktivists, etc.) Knowledge of the Cyber Threat Intelligence Cycle. Experience with the establishment, configuration, and/or development of a Threat Intelligence Platform (i.e., Anomali, ThreatConnect, etc.) Experience with Anti-Malware component software (i.e., Microsoft Defender). Experience with Security Information and Event Management (SIEM) systems. Experience conducting non-attributable research and conducting research using deep web. Ability to define and characterize all pertinent aspects of the operational environment. Skill in developing or recommending analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. Knowledge of general Supervisory control and data acquisition (SCADA) system components. Knowledge of host-based security products and how those products affect exploitation and reduce vulnerability. Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP). Knowledge of how modern digital and telephony networks impact cyber operations. Experience identifying critical target elements, to include critical target elements for the cyber domain. Skill in identifying cyber threats which may jeopardize organization and/or partner interests.
ECS is an equal opportunity employer and does not discriminate or allow discrimination on the basis any characteristic protected by law. All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, or local jurisdiction law.
ECS is a leading mid-sized provider of technology services to the United States Federal Government. We are focused on people, values and purpose. Every day, our 3800+ employees focus on providing their technical talent to support the Federal Agencies and Departments of the US Government to serve, protect and defend the American People Seniority level
Seniority level Not Applicable Employment type
Employment type Full-time Job function
Job function Information Technology Industries IT System Data Services Referrals increase your chances of interviewing at ECS by 2x Get notified about new Cyber Security Analyst jobs in
Washington, DC . Reston, VA $70,000.00-$85,000.00 2 weeks ago Security Operations Center (SOC) Analyst - Mid
Washington, DC $120.00-$125.00 3 weeks ago Herndon, VA $90,000.00-$115,000.00 1 week ago Columbia, MD $55,000.00-$60,000.00 2 days ago Security Operations Center (SOC) Analyst
FBI Special Agent: Cybersecurity/IT Expertise
Arlington, VA $99,461.00-$128,329.00 1 week ago Junior Cybersecurity SIEM Monitoring Analyst
Information Security Analyst (SOC 2 Compliance)
Fairfax, VA $92,400.00-$115,000.00 4 weeks ago Security Operations Center (SoC) Analyst
Sterling, VA $70,000.00-$85,000.00 3 days ago Washington, DC $92,000.00-$130,000.00 3 weeks ago Bethesda, MD $70,000.00-$85,000.00 1 week ago Junior Cybersecurity Threat Intelligence Analyst
Security (SOC) Analyst, Secret Clearance Required
Herndon, VA $70,000.00-$76,000.00 2 weeks ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr