Llintel 325 with Security Clearance

Employer
Base One Technologies
Location
Washington, DC
Posted
Feb 22, 2021
Closes
Feb 24, 2021
Ref
1750698562
Function
IT, Security Engineer
Hours
Full Time
Tier 3 Cyber Threat Intelligence AnalystWork location: L'Enfant Plaza, DC Shift: Regular Day shift Job Description: Are you someone concerned with the security of our nation? Are you driven to protect and serve? Are you skilled in cyber defense? Then Leidos is the place for you. We are ensuring our nation's security in a partnership with the client. Our partnership focuses on the Security Operations Center (SOC) Support Services Program where we provide around the clock cyber support focusing on some our nation's toughest threats. Our client has a need for a talented Tier 3 Cyber Threat Intelligence Analyst to join our team on this highly visible cyber security single-award IDIQ vehicle that provides security operations center (SOC) support, cyber analysis, application development, and a 24x7x365 support staff. Duties will include investigating computer and information security incidents to determine extent of compromise to information and automated information systems, providing computer forensic and intrusion support to high technology investigations in the form of computer evidence seizure, computer forensic analysis, data recovery, and network assessments, researching and maintaining proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption.In addition, the Tier 3 Analyst will lead and mentor other SOC Support Staff and will communicate with executive leadership regarding matters of significant importance to the DHS SOC Support Services Program. Basic Qualification:The candidate should have a minimum of 5 years of experience cyber security analyst performing intelligence analysis, collection management, and technical analysis. They should also have substantial experience in identifying, tracking, and investigating high priority threat campaigns, malicious actors with the interest, capability and TTPs (Techniques, Tactics and Procedures). The candidate should also have experience with or possess deep knowledge of:o 2+ years with host-based and network-based security monitoring solutions and to include security content recommendation or development (host based and network signatures)o Maintaining and driving the development of new reports of Cyber Threat Intelligence analysis to peers, management and customer teams for purposes of situational awareness and making threat intelligence actionableo Providing support to the Security Operations Center during incident response and threat hunting activities that include cyber threat analysis support, research, recommending relevant remediation and mitigationo Conducting trending and correlation research from various cyber intelligence sources for the purposes of indicator collection, shifts in TTPs, attribution, and establishing countermeasures to increase cyber resiliency o One or more of the following computer languages to support cyber threat detection or reporting: Python, Bash, Visual Basic, C++, XML, HTML, and Powershello Host-based and network-based forensics related to the identification of advanced cyber threat activities, intrusion detection, incident response, malware analysis, and security content development (eg, signatures, rules etc.); and cyber threat intelligence. o Developing scripts to support cyber threat detection that outputs results in a variety of formatso Cyber Kill Chain and applicable analytic models such the Diamond Model o Strong written and oral communication skills Preferred qualification:Previous DOD, IC, Counter Intelligence, or Law Enforcement (LE) Training/ExperienceKnowledge of Structured Analytic TechniquesOne of the following certifications: GCED, GCIA, GCFA, GPEN, GWAPT, GCFE, GREM, GXPN, GMON, GCIH, CCFP, CCSP, CISSP, CSIH, CHFI, LPT, ECSA, OSCP, OSCE, OSWP, OSEE, EnCE