Cyber Threat Intelligence Analyst

Job Title: Cyber Threat Intelligence Analyst

Max Conversion Salary: $95,000

Position of Public Trust Clearance

Notes: Prefer local candidates for face to face interviews

Northrop Grumman Technology Services sector is seeking a Cyber Threat Intelligence Analyst to join our team of qualified, diverse individuals. This position will be located in Raleigh, NC.

This position will work with the Cybersecurity Operations Center to identify, analyze, and mitigate threats to the customer’s network.

Duties include, but not limited to:
Provide 24/7 continuous monitoring of all information systems within the environment.
Determine root cause of identified anomalous and or malicious activity through analysis and report generation as applicable in accordance with organizational computer network directives.
Develop tools and queries for parsing existing data sets to identify anomalous and potentially malicious activity.
Collaborate with external entities and authorities to collect and share Indicators of Compromise (IoC) and discovered intelligence.
Develop and distribute situational activity reports on existing and newly discovered vulnerabilities within and without the organization, as applicable.
Provides daily summary reports of network events and activities for situational awareness and metric generation.
Recommend mitigation Tactics Techniques and Procedures (TTPs) for identified malicious logic within the customer’s environment.
Capable of performing basic static and dynamic malware analysis.
Assist in the development of Standard Operating Procedures (SOP) for the identification and investigation of malware activity on the network.
Collaborate with Incident Response and Threat Detection personnel for the investigation and remediation of identified threats.

This requisition may be filled at a higher grade based on qualifications listed below.

Basic Qualifications

To be considered for this position, you must minimally meet the knowledge, skills, and abilities listed below.

A Bachelors Degree and a minimum of 5 years of related technical experience
Minimum of 5 years experience with tools and techniques that monitor and defend all networks, enclaves and systems on a 24/7 basis
Must be a self-starter and work well in a team environment
Ability to gain and maintain a Public Trust clearance – requires US Citizenship or Permanent Resident status. Must not have traveled outside the US for a combined total of 6 months or more in the last 5 years.
Position is based in Raleigh, NC and does not provide relocation assistance

Preferred Qualifications

Candidates with these preferred skills will be given preferential consideration:

Active Top Secret or Secret security clearance with the ability to obtain a TS/SCI.
Active Public Trust clearance
CEH, GCIA, GCIH, CCNA, OSCP, or CISSP Certification
Link analysis and hostile infrastructure tracking
Excellent written and verbal communication skills
Experience conducting network forensics concurrent with IT, military or law enforcement investigations.
Experience with Splunk or parsing large data sets
Experience with PCap data
Experience IDS log capture and Einstein reporting
Experience with malware reverse engineering


. . . . . . . .

Leave a Reply