Cyber Security Analyst





We are seeking an experienced Cyber Threat Intelligence Analyst to join our team in Raleigh, NC. Cyber threat analysts conduct all-source analysis, digital forensics, and targeting to identify, monitor, assess, and counter the threat posed by foreign cyber actors against US information systems, critical infrastructure and cyber-related interests. Cyber threat analysts are professional intelligence officers who apply their scientific and technical knowledge to solving complex intelligence problems, produce short-term and long-term written assessments, and brief US policymakers and the US cyber defense community. This work demands initiative, creativity, analytical skills, and technical expertise.

Responsibilities include but are not limited to:


  • Selected candidate will collect and analyze event information and perform threat or target analysis duties.
  • Provides operations for persistent monitoring on a 24/7 basis of all designated networks, enclaves, and systems.
  • Interprets, analyzes, and reports all events and anomalies in accordance with Computer Network directives, including initiating, responding, and reporting discovered events.
  • Reviews incident logs/records mining for patterns and correlate with tools, including Splunk
  • Manages and executes first-level responses and addresses reported or detected incidents.
  • Coordinates with external organizations and authorities to collaborate on investigations, collect IOCs, share intelligence, etc.
  • Coordinates and distributes directives, vulnerability, and threat advisories to identified consumers.
  • Provides daily summary reports of network events and activities and delivers metric reports.
  • Recommend counter measures to malware and other malicious type code and applications that exploit customer communication systems.
  • Monitors various sources for threat intelligence on a regular basis.
  • Conduct reverse engineering for known and suspected malware files.
  • Develop policies and procedures to investigate malware incidents for the entire computer network.
  • Assist in the development and delivery of malware security awareness products and briefings.
  • Develops models for identifying malicious activity using various tools and statistical analysis.
  • Works closely with other teams to investigate and remediate incidents.






  • Bachelor’s degree and at least 5 years’ experience in a level 3 role
  • Ability to gain and maintain a Public Trust
  • Must be a self-starter and work well in a team environment

Preferred qualifications:

  • Active Top Secret or Secret security with the ability to obtain a TS/SCI.
  • Existing Public Trust
  • CEH, MSCE, CGIA, CCNA, or CISSP Certification.
  • Statistical modeling and analysis experience to infer possible cybersecurity threats
  • Excellent written and verbal communication skills
  • Experience in analysis in investigations, such as with IT, law enforcement, military intelligence, or business analytics
  • Pentesting experience
  • Experience with Splunk


  • Ability to gain and maintain a Public Trust


 Parsons is proud of our 70+ years in delivering engineering, technical, and construction services to our legacy markets: �infrastructure, industrial, federal, and construction. As markets have evolved, so have we. Parsons is a provider of choice for cybersecurity and alternative project delivery services. We believe talent, passion, and commitment generate success. Parsons employees go the distance for our customers and give back to the communities in which we live and work. We welcome self-starters who have the ability to solve problems elegantly-and who believe in our core values of integrity, safety, quality, innovation, sustainability, and diversity. If this describes you, join us! Parsons delivers a better world.�
 Parsons is an equal-opportunity, drug-free employer committed to diversity in the workplace. Minority/Female/Disabled/Protected Veteran/LGBT.



Primary Location



Leave a Reply