JOIN THE TEAM TODAY!
Our reputation is built on the skills and successes of our employees.
Computer Forensic & Intrusion Analyst (Journeyman)
Learn more about this opportunity below: REQ ID: 6071-DC3II
Clearance: TS/SCI FSP
-Ability and desire to create and deliver in-depth briefings of reported cyber targeting, trends, and technology, to include attack vector, technique, and mitigation
-Polished presentation skills with the ability to adjust content and delivery to a variety of audiences with varying cyber technical knowledge and experience
-Strong experience tracking Advanced Persistent Threat (APT) cyber activity with an understanding of common intrusion set tactics, techniques, and procedures (TTPs)
-Demonstrated experience authoring various types of cyber threat intelligence products
-Experience using analytical approaches or methodologies such as Diamond Model of Intrusion Analysis, Cyber Kill Chain, Mitre ATT&CK framework
-Experience performing cyber threat analysis based on Indicators of Compromise (IOCs)
-Experience performing open source analysis for cyber event correlation, data enrichment, and threat hunting
-Demonstrated motivation to maintain awareness of current cybersecurity and threat intelligence news and trends
-Technical skills proficiency in: network defense operations (SIEM, firewalls, IDS/IPS, Proxies), basic malware analysis and/or digital computer forensics
-Certifications: CASP, GCIA, GCIH, or GCFE
Primary Cyber Threat Intelligence Briefer for the Defense Cyber Crime Center (DC3) DoD-Defense Industrial Base Collaborative Information Sharing Environment (DCISE) mission. The successful candidate will create, maintain and present cyber threat intelligence briefings to a variety of audiences including the Defense Industrial Base (DIB) and USG Stakeholders that are responsible for supporting computer network defense (CND) operations . Mission briefings are focused on Advanced Persistent Threat (APT) activity, intrusion set tactics, techniques, and procedures (TTPs), and the targeting analysis of CDCs and DIB Partners. DC3/DCISE analysis and threat products are based on partner incident reporting, government reporting, and OSINT analysis.
Alliant LCAT Description: Possesses and applies expertise on multiple complex work assignments. Assignments may be broad in nature, requiring originality and innovation in determining how to accomplish tasks. Operates with appreciable latitude in developing methodology and presenting solutions to problems. Contributes to deliverables and performance metrics where applicable.
Suggested Qualifications: 13 years of professional experience without a degree; or 5 years of professional experience with a Bachelors degree from an accredited college in a related discipline, or equivalent experience/combined education; or 3 years of professional experience with a related Masters degree; or no experience required with a related PhD or JD. Consideration should always be given for the level of specific domain expertise.