Recent Searches

You haven't searched anything yet.

6 Cyber Intel Analyst: Mid Level (Secret Clearance Required) - FUTURE NEED Jobs in Linthicum Heights, MD

SET JOB ALERT
Details...
Cipher Tech Solutions
Linthicum Heights, MD | Full Time
$115k-142k (estimate)
2 Days Ago
Dhara Consulting Group
Linthicum Heights, MD | Full Time
$122k-151k (estimate)
2 Months Ago
Dhara Consulting Group
Linthicum Heights, MD | Full Time
$122k-151k (estimate)
2 Months Ago
Cyber Intel Analyst: Mid Level (Secret Clearance Required) - FUTURE NEED
Cipher Tech Solutions Linthicum Heights, MD
Apply
$115k-142k (estimate)
Full Time 2 Days Ago
Save

Cipher Tech Solutions is Hiring a Cyber Intel Analyst: Mid Level (Secret Clearance Required) - FUTURE NEED Near Linthicum Heights, MD

FUTURE NEED

Location: Linthicum, MD

Description:

Please note this is not a cybersecurity or systems engineer position. The selected candidate will serve as a cyber intelligence analyst and must have relevant experience as such (see below for requirements). The selected candidate will serve as a cyber intelligence analyst. The analyst provides the customer with expertise in Intelligence sources, collection methods and analytic techniques. The analyst collaborates among internal partners to identify malicious activity and provide analytic support to the investigation and operation groups. The analyst performs analysis on existing and emerging APT organizations, actors, and malware.

Ideal candidate has experience with cyber intelligence analysis or law enforcement/counterintelligence analysis, and has applied their mastery of cyber threat intelligence, intelligence analysis techniques, sources and methods to produce high quality analysis products.

Requirements:

Must be a US Citizen with a SECRET security clearance (no exceptions)

Must hold a BA/BS degree in Information Technology or Information Security, Computer Science, Intelligence Studies, Cyber Security or another related field of study or equivalent 3 years performing technical cyber threat intelligence analysis.

Must have minimum 1 year of related Cyber Intel experience outside of a classroom setting (no exceptions)

Must have strong technical skills proficiency in the following areas: network communication using TCP/IP protocols, basic system administration, basic understanding of malware (malware communication, installation, malware types), intermediate knowledge of computer network defense ops (proxy, firewall, IDS/IPS, router/switch) and open source information collection.

Must have knowledge of Cyber Threat Intelligence principles to include indicators of compromise types, indicator pivoting and indicator attribution strength.

Must have an understanding of IC and how those cyber organizations work together for purposes of conducting cyber threat analysis .

Must have strong technical report writing skills.

Must have the ability to apply formal intelligence analysis methods, develop hypothesis, prove/disprove relationships, always ask why, defend your analysis, and apply attribution to cyber threat activity. Candidate must be able to make confidence-based assessments for purposes of attribution based on their technical analysis of network traffic, multi-source data, malware and system forensic analysis. Candidate must be able to identify analytic bias.

Must have recent experience or familiarity with open source cyber intelligence research tools including, but not limited to, VirusTotal, PassiveTotal, Domain Tools, AlienVault Open Threat Exchange, Threat Connect, URLScan.io, and MXToolbox.

Must have the ability to build intrusion related data visualizations and perform analysis (i.e., using I2 Analyst Notebook, Netviz, Palantir, etc)

Ability to present technical information and analysis to professionals and peers on a regular basis.

Must have the ability to proactively engage and develop relationships with intrusion set subject matter experts.

Desired Skills:

Mandarin or Russian language skills

Formal training as an intelligence analyst in any discipline

Graduate of US Govt intelligence analysis course: CAC, IBC, Kent School, IC 101, Analysis 101, Army, Navy, Air Force, etc

Experience applying Kill Chain analysis, Cyber Intelligence Preparation of the Environment modeling, or Diamond modeling of cyber threat activity

Recent experience performing NETFLOW and PCAP analysis using common analysis tools (examples include Wireshark, Splunk, ChopShop, Dshell, Network Miner, Moloch, etc).

Should be proficient at sessionizing PCAP data, identifying and decoding protocols, extracting files, and applying standard filters such as Berkley Packet Filter (BPF).

Certifications (any): CISSP, CEH, Security , SANS certification(s), Network , CCNA

Advanced NETFLOW and PCAP Analysis

Advanced Data Visualization proficiency leveraging COTS/GOTS tools

Technical Skills proficiency: Python language, encryption technologies/standards

Intermediate malware analysis or digital computer forensics experience

Any type of Cyber related Law Enforcement or Counterintelligence experience

Existing Subject Matter Expert of Advanced Persistent Threat activity

Experience using COTS/Open Source tools: Novetta Cyber Analytics, Mitre ChopShop and/or ARL DSHELL

Analyst experience in the IC

Benefits:

Mission focused work environment

Subsidized medical/dental/vision insurance

HSA contributions

401k matching

Holiday and Paid Time Off (PTO)

Monthly WAN parties & quarterly events

Flexible hours

Remote work is NOT an option. We do offer relocation assistance. Please see our careers page or inquire with your recruiter about the terms and conditions.

Vaccination Notice:

Please be aware that you are applying for a position to work as a federal contractor. As such, Cipher Tech will require, and your employment will be subject to, such vaccinations as are required by federal, state, and local law requirements.

About Us

At the core of Cipher Tech Solutions, Inc. (Cipher Tech), you'll find a team of exceptionally talented engineers and software developers who are driven to solve the toughest problems facing national security today. Primarily acting as an engineering service provider, Cipher Tech provides a variety of technical experts to government customers for injection into new or preexisting teams, both on and off customer sites that are charged with moving the mission forward through applied technology.

Expanding the company's workforce to include a cadre of well-trained digital forensic examiners became a necessity as our military customers, impressed with our forensic software development expertise, asked us to expand the scope of our support.

Today, Cipher Tech provides our customers with a targeted blend of investigative, analytical, and engineering staff all focused narrowly on the field of digital forensics. Embedded directly with the customers we support, we work efficiently and effectively to deliver support for both strategic and tactical mission sets.

Help us meet our customer's demands and find out why we're excited to go to work.

Commitment to Diversity & Inclusion

Cipher Tech is an Equal Opportunity and Affirmative Action Employer. We value diversity and inclusion, not only for the sake of compliance, but also because diversity of thought drives progress and improves performance. All hiring and employment decisions are made on the basis of business requirements, performance, and merit-with no regard to race, color, religion, sexual orientation, gender, gender identity, national origin, or other protected status.

CIPHER TECH IS COMMITTED TO HIRING QUALIFIED VETERANS!

Job Summary

JOB TYPE

Full Time

SALARY

$115k-142k (estimate)

POST DATE

07/01/2024

EXPIRATION DATE

07/16/2024

WEBSITE

ciphertechsolutions.com

HEADQUARTERS

GRANDVIEW, NY

SIZE

25 - 50

FOUNDED

2001

CEO

KEITH BERTOLINO

REVENUE

$5M - $10M

INDUSTRY

IT Outsourcing & Consulting

Show more