Threat Intelligence Analyst

PeratonChantilly, VA
10h$112,000 - $179,000Onsite

About The Position

Peraton is looking for a Threat Intelligence Analyst to support one of our longstanding customers. Location: Chantilly, VA In this role you will: Use tools such as OpenCTI, you will monitor threat information from open, commercial, and classified sources to inform on threat data, capabilities, and evolution. Analyze Actor tactics, techniques, and procedures to increase the cyber threat knowledge base. Be responsible for communication and information sharing with customer and stakeholders. Document Indicators of Compromises of current cyber threat trends. Report on underlying patterns of behavior by conducting detailed analysis of incidents, threats and risks and associated impacts and consequences. Enrich information within the Threat Indicator/Information Database to provide additional context. Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Requirements

  • Bachelor’s degree and minimum of 8 years of relevant experience. OR an additional 4 years of experience in lieu of a degree.
  • Minimum of 5 years in Cyber Threat Analysis.
  • Ability to operate threat intelligence platforms (e.g., OpenCTI ).
  • Experience with multiple operating systems ( Windows, Linux, Android ).
  • Knowledge of application, network, and mobile device security.
  • Aptitude for analyzing threat reports and distilling actionable intelligence.
  • Experience producing threat assessments (alerts, briefs, threat landscape reports).
  • Ability to research malicious infrastructure used by attackers.
  • Familiarity with the MITRE ATT&CK framework.
  • U.S. citizenship required.
  • Active Top Secret clearance with SCI eligibility and ability to obtain a polygraph.

Responsibilities

  • Monitor threat information from open, commercial, and classified sources to inform on threat data, capabilities, and evolution.
  • Analyze Actor tactics, techniques, and procedures to increase the cyber threat knowledge base.
  • Communication and information sharing with customer and stakeholders.
  • Document Indicators of Compromises of current cyber threat trends.
  • Report on underlying patterns of behavior by conducting detailed analysis of incidents, threats and risks and associated impacts and consequences.
  • Enrich information within the Threat Indicator/Information Database to provide additional context.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service