What are the responsibilities and job description for the Cyber Threat Intelligence Lead position at ManTech?
ManTech is seeking a highly skilled and knowledgeable Cyber Threat Intelligence Lead who is responsible for leading a small team of cyber threat intelligence analysts. This position is located on customer site in Washington, D.C.Responsibilities include but are not limited to : Triage information collected from different threat intelligence sources, including internal sources, and study the pattern of attacks, their methodology, motive, severity, and threat landscape applicable to client systems.Enhance the organization’s overall cybersecurity posture by delivering timely, relevant, cyber intelligence information to stakeholders.Monitor open-source websites for hostile content directed towards organizational or partner interests.Use open-source intelligence (OSINT) collection methods and tools to enhance overall threat intelligence capabilities.Gather information from private and proprietary sources, including paid subscriptions, information-sharing communities, or partnerships with other organizations.Analyze collected data to identify potential threats, vulnerabilities, and emerging trends.Synthesize threat data from diverse sources and identify complex attack patterns and trends.Enrich data with context to provide a more comprehensive understanding of threats, such as attributing specific threats to threat actors or groups.Provide tactical intelligence that helps the SOC understand the specifics of current threats, including indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs) used by attackers.Offer strategic intelligence to help the organization anticipate long term trends, understand the motivations of threat actors and plan for future cybersecurity challenges.Assist the SOC during ongoing incidents by providing real-time intelligence updates, context, and guidance to help investigate, contain, and remedy threats.Actively participate in information-sharing communities and industry groups and collaborate with other organizations to gain and contribute to a collective understanding of the threat landscape.Provide reports and briefings to key stakeholders to keep them informed about the evolving threat landscape and the effectiveness of current security measures.Conduct threat hunt activities to proactively identify and mitigate potential threats in the environment.Minimum Qualifications : Bachelor’s degree, preferably in IT, Cybersecurity, Engineering, Computer Science, Mathematics, or related discipline.7 years of IT experience with a minimum of 5 years’ experience with cyber intelligence analysis.2 years of experience performing threat hunts.2 years of experience using Splunk.Demonstrated experience using MITRE ATT&CK framework for cyber threat intelligence and hunting.Demonstrated experience using the STRIDE and DREAD threat models for risk assessments and evaluating potential threats.Experience using open-source / OSINT collection methods and tools to enhance threat intelligence activities.Preferred Qualifications : Hands-on experience with Microsoft Sentinel.Experience using threat intelligence sharing platforms and collaborative frameworks, such as Information Sharing and Analysis Centers (ISACs).Security Clearance Requirements : Must possess an active Top Secret security clearance.#J-18808-Ljbffr