What are the responsibilities and job description for the Cyber Threat Analyst - TS/SCI required position at TAA Solutions LLC?
ACTIVE TS/SCI REQUIRED
__
**
Looking for a Cyber Hunt Analyst to apply strong cyber security, Defensive Cyber Operations (DCO) and networking domain knowledge to support cyber analytics product development and modeling, threat analysis, and direct customer mission support. Regular activities consist of hunting for threats, reporting on findings, and converting tools, techniques and processes into automated capabilities for the current cyber platform. Will also be responsible for collecting customer Cyber Operations requirements, generating use cases, providing Cyber SME support and system training to end users.
Skill areas:
- Security Operations Center (SOC) operations
- Blue/red team
- Penetration testing
- Endpoint log analysis
- Network (PCAP) log analysis
- Familiarity with the Elastic, Logstash and Kibana (ELK) stack with a focus on utilization of Kibana to create dashboards and visualizations to identify anomalies
Security Clearance:
- Current Top Secret (TS/SCI) level security clearance is required and therefore all candidates must be a U.S. Citizen.
Required skills:
- Bachelor’s Degree in Information Technology, Cyber Security or similar field. Educational requirements may be adjusted for applicable work experience. Work experience may be adjusted for highly specialized knowledge or uniquely applicable experience.
- 3 years of experience in cyber security operations related fields.
- Knowledge of Defensive Cyber Operations (DCO), including threat hunting methodologies.
- Technical experience to cyber data analysis to include continuous monitoring, intelligence, and reporting.
- Ability to abstract threat hunting concepts to look at the ‘big picture’ and discover threats that aren’t captured by traditional methods (e.g. SIEMs).
- Experience in big data hunting analysis and reporting.
- Advanced experience in using cyber tools, defensive toolkits, endpoint and network sensors, SIEMs, and threat sharing platforms (e.g. MISP).
- Advanced experience with the MITRE ATT&CK framework and associated TTPs.
- Leverages an understanding of enterprise IT infrastructure, systems monitoring, and networking to identify suspicious patterns and behaviors within the ecosystem.
- Excellent verbal, written, analytical, and presentation skills.
- Ability to multi-task in a deadline-oriented environment.
- Demonstrated ability to work well independently with little input, and as a part of a team.
- Excellent work ethic and a high commitment to quality.
- Ability to travel up to 25% of the time.
Desired skills:
- Prior experience interfacing, consulting and training customers is a big plus.
- Security certification.
- CISSP, CEH or similar certification.
Job Type: Full-time
Pay: $31,956.00 - $998,449.00 per year
Benefits:
- 401(k)
- Dental insurance
- Flexible schedule
- Health insurance
- Paid time off
- Vision insurance
Schedule:
- Monday to Friday
Supplemental Pay:
- Bonus pay
Application Question(s):
- Are you a U.S. Citizen?
- What is the salary you are looking for?
Experience:
- Cyber Security Operations: 3 years (Preferred)
- Threat Hunting: 3 years (Preferred)
- Information security: 1 year (Preferred)
Security clearance:
- Top Secret (Preferred)
Work Location: Multiple Locations
Salary : $31,956 - $998,449