Cyber Intelligence Analyst Manager
Description: Leidos Cybersecurity Intelligence&Response Center has an immediate opening for an experienced, and motivated Cyber Intelligence Analyst Manager. Reporting to the Director of the Cybersecurity Intelligence&Response Center, this position is responsible for the central management, oversight, and evolution of the team defending Leidos'global networks through threat hunting, and tactical analysis of ongoing attacks by criminal and nation state actors. This position requires working experience in cyber security or incident response, preferably with direct management of cyber threat intelligence and/or hunting operations. In this role, you will provide technical expertise and leadership to a team of Cyber Intel Analysts, provide appropriate levels of situational awareness to stakeholders, including staff, management, senior and executive leadership, and deliver cyber threat intelligence reports and briefings to internal teams, and senior leadership. Additionally, you will provide oversight to both internal and external community information sharing relationships. Primary Responsibilities - Build and develop a team of cyber intelligence analysts to identify, track and investigate high priority threat campaigns and malicious actors. - Lead Cyber Security Incident Handling when necessary. - Manage cyber threat analysts researching current and emerging threats, campaign assessment, data collection and analysis; collecting, assessing, and cataloging threat indicators and responsibility for adding context to threat indicators to convey urgency, severity, and credibility - Communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means, to different constituencies such as legal counsel, executive management and technical staff. - Escalate new threats to leadership in a timely manner with appropriate information regarding risk, action times, and mitigation recommendations - Oversee the team's collaboration with external CIRTs, intelligence entities and industry communities (such as DSIE, DCISE) on observed TTPs and activities of persistent threat actors. - Validate information received from other organizations to minimize resource expenditures on bad intelligence - Lead strategic projects and develop capabilities to enhance and mature existing cyber threat intelligence functions. - Drive innovation, and provide thoughtful leadership on current and future cyber security initiatives. - Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations. - Interface with Business Unit and Corporate group leadership to provide an understanding of current threats targeting their environments and what security measures are currently mitigating these threats. CyberCIS Qualifications: Basic Qualifications: - Master's degree and minimum of 15 years'experience in cybersecurity, or cybersecurity incident response. Additional years of relevant experience will be considered in lieu of Master's degree. - Minimum of two years managing an Information/Cyber Security Team with responsibilities that include security incident response and handling - Able to work with sensitive materials and employee information and maintain confidentiality at all time - Experience building and managing teams - Experience in conventional network\\host-based intrusion analysis, digital forensics or malware analysis. - Experience performing\"deep dive\"analysis and correlation of log data from multiple sources including PCAP and forensic artifacts. - Experience with incident response activities involving APT threat actors, and working ongoing pervasive intrusion sets. - Strong understanding of Operating Systems and Network Protocols. - Ability to track and research changes within the information security field and provide actionable intelligence. - Hands-on experience with security technologies such as: - Endpoint Detection&Response tools (EDR) - FireEye HX, CarbonBlack, SentinelOne, GRR, etc - Intrusion Detection&Prevention (IDP) Sourcefire, Snort, Bro - Security Information&Event Management (Splunk preferred) - Network Analysis tools - Wireshark, tcpdump - Full Packet Capture Preferred Qualifications: - Understanding of behavioral based threat models, including ATT&CK, Cyber Kill Chain, Diamond Model, etc. - A deep understanding of advanced cyber threats targeting enterprises, along with the tools, tactics, and procedures used by those threats. - Experience applying threat and data modeling, advanced data correlation, and statistical analysis to develop alerts, notable events, investigative dashboards, and metrics driven reports. - Experience with Incident Response methodology in investigations, and the groups behind targeted attacks and tactics, techniques, and procedures (TTPs) - Experience in a security intelligence center or similar environment tracking threat actors and responding to incidents. - Familiarity with cyber threat landscape, geopolitical issues that could have cyber impacts, security vulnerabilities, exploits, malware, digital forensics, network security vulnerabilities, exploits and attacks - Familiarity with common languages (like Perl and Python) to parse logs, automate processes, and integrate systems. - Tool agnostic ability to conduct preliminary malware analysis. - Ability to create, modify, and implement both Snort and YARA signatures. - Proficiency with Microsoft Windows administrative tools, and the Unix/Linux command line. - Capable and comfortable communicating actionable threat intelligence to both technical and executive-level stakeholders. - Previous experience as Threat Researcher and/or Intelligence Analyst. - Threat hunting experience - Experience performing dynamic malware analysis. - Experience with malware reverse engineering. - Solid understanding of networking protocols and infrastructure designs; including cloud infrastructures, routing, firewall functionality, host and network intrusion detection systems, encryption, load balancing, and other network protocols - Hands-on experience with security technologies: - Threat Intelligence Platforms - CRITS, MISP, ThreatConnect, Anomali, etc - Malware Sandboxing - Cuckoo, Yara, Volatility, etc - Understanding of basic data structure formats (eg JSON, XML, STIX/TAXII, Syslog, etc.) - Published research papers at conferences or through other mediums (blogs, articles). - Working knowledge of Computer Network Exploitation (CNE), Computer Network Attack (CNA) and Computer Network Defense (CND) tools and techniques. Leidos Overview: Leidos is a global science and technology solutions leader working to solve the worlds toughest challenges in the defense, intelligence, homeland security, civil, and health markets. The companys 33,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported pro forma annual revenues of approximately $10 billion for the fiscal year ended January 1, 2016 after giving effect to the recently completed combination of Leidos with Lockheed Martin's Information Systems&Global Solutions business (IS&GS). For more information, visit www.Leidos.com. The companys diverse employees support vital missions for government and commercial customers. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status. Leidos will consider qualified applicants with criminal histories for employment in accordance with relevant Laws. Leidos is an equal opportunity employer/disability/vet.