Clearance Jobs
Senior Cyber Threat Analyst
Clearance Jobs, Washington, District Of Columbia, United States, 20599
Senior Cyber Threat Analyst
At Agile Defense we know that action defines the outcome and new challenges require new solutions. That's why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next. Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests. The Bureau of Engraving and Printing's (BEP's) core mission is to design and manufacture high-quality security documents that meet customers' requirements for quality, quantity, and performance, as well as counterfeit deterrence. Provides expert and deep analysis and interpretation of complex cyber threats, identifying potential attack vectors, attributing threat actors, and providing strategic insights to proactively mitigate cyber risks within BEP. Job Duties and Responsibilities: Conduct in-depth analysis of cyber threats, including malware, phishing campaigns, advanced persistent threats (APTs), and other malicious activities to understand their tactics, techniques, and procedures (TTPs). Actively monitor open-source intelligence, industry reports, and internal security logs to gather threat information, then synthesize and disseminate critical insights to relevant stakeholders. Proactively search for potential malicious activity with proactive threat hunting techniques within the network using advanced security tools and techniques. Provide a proven ability to analyze complex cyber threat intelligence, identify patterns, and attribute attacks to specific actors. Maintain significant experience in threat analysis practices, deep technical expertise, to lead or mentor junior analysts on the team. Qualifications: Required Certifications: CISSP or equivalent certification is required. (Equivalent certification covers similar level of information security domains or depth of knowledge and or experience.) Education, Background, and Years of Experience: Bachelor's degree in Computer Science or IT related disciplines with 7 years of related experience. 3 years of experience as a cyber threat analyst, with a demonstrated track record of analyzing complex cyber threats. Additional Skills & Qualifications: Required Skills: Proficiency in analyzing malware, phishing campaigns, and APTs to identify TTPs. Expertise in threat actor attribution using behavioral analysis, infrastructure mapping, and Indicators of Compromise (IOCs). Ability to dissect complex attack vectors (e.g., zero-day exploits, supply chain attacks) and map them to known threat groups. Hands-on experience with Security Information and Event Management (SIEM) systems (e.g., Splunk, Elastic) for log analysis and correlation. Expertise in collecting and analyzing OSINT from sources like dark web forums, social media, and industry reports. Knowledge of frameworks like MITRE ATT&CK and Diamond Model for structuring threat intelligence. Experience in conducting digital forensics to trace attack origins and reconstruct attack timelines. Preferred Skills: Understanding of machine learning techniques for anomaly detection or predictive threat modeling. Proactive threat-hunting skills to identify stealthy or undetected threats within the environment. Understanding of cryptographic protocols (e.g., TLS, SSH) and their vulnerabilities. Strong critical thinking and problem-solving skills to connect disparate data points and anticipate threat evolution. Working Conditions: Environmental Conditions: Standard office building working within a cube and near co-workers. Strength Demands: Sedentary - 10 lbs. Maximum lifting, occasional lift/carry of small articles. Some occasional walking or standing may be required. Physical Requirements: Stand or Sit; Walk; Use Hands / Fingers to Handle or Feel; See
At Agile Defense we know that action defines the outcome and new challenges require new solutions. That's why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next. Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests. The Bureau of Engraving and Printing's (BEP's) core mission is to design and manufacture high-quality security documents that meet customers' requirements for quality, quantity, and performance, as well as counterfeit deterrence. Provides expert and deep analysis and interpretation of complex cyber threats, identifying potential attack vectors, attributing threat actors, and providing strategic insights to proactively mitigate cyber risks within BEP. Job Duties and Responsibilities: Conduct in-depth analysis of cyber threats, including malware, phishing campaigns, advanced persistent threats (APTs), and other malicious activities to understand their tactics, techniques, and procedures (TTPs). Actively monitor open-source intelligence, industry reports, and internal security logs to gather threat information, then synthesize and disseminate critical insights to relevant stakeholders. Proactively search for potential malicious activity with proactive threat hunting techniques within the network using advanced security tools and techniques. Provide a proven ability to analyze complex cyber threat intelligence, identify patterns, and attribute attacks to specific actors. Maintain significant experience in threat analysis practices, deep technical expertise, to lead or mentor junior analysts on the team. Qualifications: Required Certifications: CISSP or equivalent certification is required. (Equivalent certification covers similar level of information security domains or depth of knowledge and or experience.) Education, Background, and Years of Experience: Bachelor's degree in Computer Science or IT related disciplines with 7 years of related experience. 3 years of experience as a cyber threat analyst, with a demonstrated track record of analyzing complex cyber threats. Additional Skills & Qualifications: Required Skills: Proficiency in analyzing malware, phishing campaigns, and APTs to identify TTPs. Expertise in threat actor attribution using behavioral analysis, infrastructure mapping, and Indicators of Compromise (IOCs). Ability to dissect complex attack vectors (e.g., zero-day exploits, supply chain attacks) and map them to known threat groups. Hands-on experience with Security Information and Event Management (SIEM) systems (e.g., Splunk, Elastic) for log analysis and correlation. Expertise in collecting and analyzing OSINT from sources like dark web forums, social media, and industry reports. Knowledge of frameworks like MITRE ATT&CK and Diamond Model for structuring threat intelligence. Experience in conducting digital forensics to trace attack origins and reconstruct attack timelines. Preferred Skills: Understanding of machine learning techniques for anomaly detection or predictive threat modeling. Proactive threat-hunting skills to identify stealthy or undetected threats within the environment. Understanding of cryptographic protocols (e.g., TLS, SSH) and their vulnerabilities. Strong critical thinking and problem-solving skills to connect disparate data points and anticipate threat evolution. Working Conditions: Environmental Conditions: Standard office building working within a cube and near co-workers. Strength Demands: Sedentary - 10 lbs. Maximum lifting, occasional lift/carry of small articles. Some occasional walking or standing may be required. Physical Requirements: Stand or Sit; Walk; Use Hands / Fingers to Handle or Feel; See