Senior Cyber Incident and Threat Analyst

Partner ForcesArlington, VA
4d$150,000 - $170,000

About The Position

As a consultant at Partner Forces, you will serve as a trusted advisor to our clients’ day in and day out. You will have the opportunity to collaborate with your colleagues, our partners, and our clients to ideate, initiate and complete tasks, projects, and initiatives. You will work on mission-oriented projects, where you will bring forward actionable insights, solve complex problems, and thrive on delivering meaningful solutions. Partner Forces is grounded in our core values of integrity, excellence, positivity, candor, determination, and teamwork. Our culture is a reflection of this, ensuring that we: Apply solution-oriented thinking to challenges and opportunities. Thrive by remaining agile and embracing change. Work to create an environment where everyone feels welcome and valued as teammates and contributors. Bring out the best in others by applying sound judgment and exuding principled genuineness. Embrace a continuous learning and growth mindset. Encourage an open dialogue even when it is hard. Continuously promoting teamwork and collaboration to achieve the best outcomes for our clients and teams. As an employee at Partner Forces, you’ll join a team of consultants who share a passion for prioritizing collaboration, crafting solutions to mitigate risk, protecting critical infrastructure and helping our national security and industry partner tackle their most pressing challenges. At Partner Forces, we take our employees’ well-being and growth as seriously as we do our mission. You will be challenged every day, but we know that business and individual growth go hand-in-hand, so we offer a wide array of benefits that support the well-being and personal and professional development of our employees. The Senior Cyber Incident and Threat Analyst will lead, manage, and provide expert-level cyber threat intelligence (CTI) and cybersecurity triage and analysis to support incident response and vulnerability management operations. This role demands a seasoned professional with a minimum of 10 years of experience in the field, capable of conducting high-quality cybersecurity incident triage and assessments.

Requirements

  • US Citizen (the nature of our contract requires employees be US citizens).
  • Top Secret clearance required.
  • 10 years of experience.
  • Bachelor’s degree preferred.
  • Strong analytical and problem-solving skills with the ability to conduct in-depth triage and support research and analysis.
  • Excellent communication skills, both written and verbal, for reporting and stakeholder engagement.
  • Ability to work collaboratively in a team environment and manage multiple tasks simultaneously.
  • Strong understanding of network security principles and intrusion detection methodologies.
  • Ability to identify and mitigate cybersecurity threats and vulnerabilities effectively.
  • Proven ability to develop and document repeatable and effective processes for SOPs and WIs.
  • Demonstrated expertise in identifying and mitigating cybersecurity threats and vulnerabilities.
  • This position requires shift work between the hours of 6:00 AM and 6:00 PM. Shifts will likely rotate between 6:00 AM–2:00 PM, 8:00 AM–4:00 PM, and 10:00 AM–6:00 PM.

Nice To Haves

  • Familiarity with emerging technologies and trends in cybersecurity.
  • Relevant certifications such as Security+, CISM, CEH, or GIAC.
  • Experience in the energy sector or other critical infrastructure industries.

Responsibilities

  • Perform cyber defense incident triage and recommend incident remediation strategies.
  • Determine the scope, urgency, and impact of cyber defense incidents.
  • Correlate threat assessment and incident data.
  • Conduct comprehensive adversary research and analysis to determine technologies used by given adversaries.
  • Identify and characterize intrusion activities against victims or targets, and profile targets and their activities.
  • Develop cybersecurity indicators to maintain awareness of the dynamic operating environment.
  • Identify near-term changes in adversary tactics, techniques, procedures, and technology.
  • Report changes in patterns and trends within cybersecurity incidents in correlation with changing environmental factors.
  • Provide descriptive and predictive analysis by fusing information from multiple reports.
  • Demonstrate experience with Mitre ATT&CK and other analytic frameworks.
  • Develop and document repeatable and effective processes for SOPs and WIs.
  • Correlate incident data to identify patterns and trends within cybersecurity incidents.
  • Generate requests for information and identify information essential to fill information gaps.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service