Intel Analyst

The Intellekt GroupHampton, VA
2d

About The Position

We are seeking a highly skilled and motivated Intelligence Analyst specializing in Defense Cyber Security Systems. The successful candidate will possess a Top Secret/Sensitive Compartmented Information (TS/SCI) clearance and have a strong background in cyber threat analysis and defense. This role is vital to ensuring the security and resilience of our national defense systems against cyber threats.

Requirements

  • Must possess an active Top Secret/Sensitive Compartmented Information clearance.
  • Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field. Master's degree preferred.
  • Minimum of 5 years of experience in intelligence analysis, cybersecurity, or a related field, with a focus on defense systems.
  • Proficiency in cyber threat analysis tools and methodologies.
  • Familiarity with defensive cyber operations and incident response frameworks.
  • Strong analytical and problem-solving skills with a keen eye for detail and the ability to interpret complex data sets.
  • Excellent written and verbal communication skills with the ability to convey complex information clearly and concisely to diverse audiences.
  • Ability to work collaboratively in a fast-paced, dynamic environment, exhibiting flexibility and adaptability.
  • 5+ yrs experience
  • One of CySA+, CBROPS, CFR, FITSP-O, GCIA, GDSA, GICSP or GCFA
  • Security clearance: Top Secret (SCI eligibility required).

Nice To Haves

  • ITIL Foundation
  • CISSP; or Certified Information Security Manager (CISM); or Certified SOC Analyst; or GIAC Certified Enterprise Defender (GCED), or GIAC GCIH; or GIAC DCIA

Responsibilities

  • Cyber Threat Analysis: Conduct comprehensive analyses of cyber threats and vulnerabilities affecting defense systems. Identify potential risks and develop strategies to mitigate them.
  • Intelligence Gathering: Gather, analyze, and interpret data from various intelligence sources to provide actionable insights into potential cyber threats.
  • Risk Assessment: Perform risk assessments of defense cyber infrastructure to identify vulnerabilities and recommend corrective actions.
  • Incident Response: Collaborate with cybersecurity teams to respond to and investigate security incidents, ensuring timely and effective resolution.
  • Reporting: Prepare detailed reports and briefings on findings, threat assessments, and recommended actions for senior leadership and stakeholders.
  • Collaboration: Work closely with government agencies, military branches, and other stakeholders to enhance information sharing and develop comprehensive defensive strategies.
  • Continuous Learning: Stay abreast of the latest cyber threats, trends, and technologies to ensure the organization remains at the forefront of defense cyber security.
  • CSSP DCO Manager: Manages DCO 24x7 Watch operations supporting CSSP Information Systems Continuous Monitoring (ISCM) mission. Overall responsible for ensuring CSSP functional capabilities are continuously monitored for alerts, warnings, and indicators for cybersecurity events.
  • Manages correlation and analysis of cybersecurity events to identify anomalous/malicious activities.
  • Works with systems and network administrators in support of the CSSP mission to protect, monitor, analyze, detect, and respond to cybersecurity events.
  • Maintains situational awareness of CSSP capabilities and functions and provides notification of degradations and unscheduled outages.
  • Manages team to proactively troubleshoot, analyze, identify, deconflict, and isolate RCA of problems that arise relating to CSSP functional capabilities impacting operations.
  • Recommends courses of action to return impacted systems, functions, and capabilities to full operational status and then implement those selected by USSTRATCOM.
  • Documents DCO actions and activities performed under this TO on the CSSP master stations log, compiling and correlating technical activities.
  • Other duties as assigned
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service