Cyber Threat Intelligence Analyst

Mantech International CorporationLorton, VA
42dOnsite

About The Position

Shape the future of defense with MANTECH! Join a team dedicated to safeguarding our nation through advanced tech and innovative solutions. Since 1968, we've been a trusted partner to the Department of Defense, delivering cutting-edge projects that make a real impact. Dive into exciting opportunities in Cybersecurity, IT, Data Analytics and more. Propel your career forward and be part of something extraordinary. Your journey starts now-protect and innovate with MANTECH! MANTECH is seeking a motivated, career and customer-oriented Cyber Threat Intelligence Analyst to join our team in Lorton, VA. The core responsibility of the Cyber Threat Intelligence Analyst is to conduct deep research into social engineering and cyber-attack campaigns and collaborate closely with data scientists, researchers, investigators, engineers, and internal & external partners to counter these threats. This person will own the Cyber Threat Operations Center (CTOC) Threat Intelligence processes and procedures. This role may include the need to work outside of core hours on high priority investigations and may also include on-call responsibilities.

Requirements

  • Bachelor's degree and at least 5 years of experience in the areas of Security Operations, Malware analysis, Threat Intelligences, Cyber Incident Response, and / or Penetration Testing. Additional 1 year of experience may be substituted in lieu of a degree.
  • ACTIVE DoD 8570 IAT Level 2 or Higher Certification upon start
  • 3+ years of data analysis and scripting experience (SQL, Python, C#, Regex, Azure Data Explorer - KQL, etc.)
  • Possess the ability to immediately take ownership of the role and operate with minimal guidance.
  • Experience with the MITRE ATT&CK Framework, the Cyber Kill Chain and/or other tools used for threat intelligence or hunting.
  • Proficient in research and writing (e.g. SOPs, threat intelligence reports, etc.)
  • Awareness of modern security related subjects and trends such as threat hunting and modeling, digital forensics, reverse engineering, phishing, and penetration testing.
  • Must have an Active Top-Secret Clearance with SCI Eligibility.

Nice To Haves

  • Experience with Cyber Threat Intelligence in Cloud environments.
  • CISSP, CISA, CISM, SANS, GCIA, GCIH, MITRE ATT&CK and/or OSCP certifications
  • Desire to acquire Microsoft SC-200
  • Experience with Azure Sentinel, Defender for Cloud and/or Microsoft Defender Threat Intelligence is desired.
  • Familiarity with Common Vulnerabilities and Exposures (CVE) tracking and remediation.

Responsibilities

  • Identify and analyze techniques that are relevant to our protection systems, being proactive to bring awareness to the activity prior to any compromise.
  • Produce intelligence on the attack landscape that drives actionable protection enhancements into our product, services, and infrastructure.
  • Prototype new detection methods and experiment with new data sources, tools, and methods for proactively identifying and monitoring attacker campaigns and changes in the attack landscape.
  • Collaborate effectively and share actionable curated intelligence with internal and external stakeholders to help them drive impact and disruption through their workflows.
  • Recommend and make appropriate updates to CTOC Threat Intelligence processes, procedures, and tools; publish intelligence on novel social engineering techniques and campaigns.
  • Mentor others and contribute to an inclusive and collaborative team culture.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Industry

Professional, Scientific, and Technical Services

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service