Leidos is seeking a Cyber Threat Intel Analyst in either Vicksburg, MS, or Hillsboro, OR (preferred). Alternatively the following locations may be available for the right candidate: New York, Hanover, Philadelphia, DC, Atlanta, Los Angeles, Fort Worth, Colorado Springs. Periodic telework is available.
Performs as the Technical SME in area of cyber threat intelligence. Incorporates threat intelligence into countermeasures to detect and prevent intrusions and malware infestation.
Identifies threat actor tactics, techniques and procedures and based on indicators develops custom signatures and blocks.
Interacts with the ACE-IT CIRT for incident response, recovery, and prevention. Interacts with the ACE-IT SOC and NOC personnel to maximize cyber threat prevention measures, enhance audit and logging standards, and enforce and monitor effective cyber security policies and configurations and security event management within the logging and SIEM infrastructure.
• Implement the core Security Intelligence Center (SIC) concepts (SOC vs. SIC, Cyber Kill Chain, APT)
• Have a strong understanding of the enterprise network and how each component contributes to Security Intelligence
• Have a strong understanding of the tools & techniques necessary to efficiently identify trends and extract indicators from large data sources
• Understand and employ the Cyber Kill Chain
• Know the importance how to be in control of the adversary's intrusion steps
• Know how to identify and create mitigations for the Cyber Kill Chain grid
• Understand the concept of APT
• Understand what makes APT different than traditional cyber threats (more examples)
• Know examples of specific intrusion techniques used by APT adversaries
• Recognize what you'll need to know to prevent or identify APT intrusions
• Understand key networking concepts relevant to the Security Intelligence process
• Understand key forensics and incident response concepts critical to the Security Intelligence process
• Understand and work with various categories of electronic evidence including media, email, and networks
• Study the detection and prevention of intrusion and attacks
• Understand structured digital evidence collection and evaluation
• Identify network architectures and select network components
• Implement a full network infrastructure including routers, switches, gateways, and firewalls
• Configure network devices and optimize network performance
• Maintain network devices, design, and infrastructure
• Understand concepts of packet analysis
• Examine different methods of policy creation, implement a security policy and create a policy document
• Navigate the command line using specific expressions to manipulate data
• Handle and organize disparate data about detections, attacks, and attackers
• Discovery techniques and vetting of new intelligence
• Build better actionable intelligence from data
EDUCATION & EXPERIENCE:
Requires Bachelor's Degree from an accredited university/college in Computer Science, Computer Engineering or related field and 6 to 12 years of prior relevant experience or Masters with 4 - 8 years of prior relevant experience.
Relevant Experience required: Computer network defense technologies and Cyber Kill Chain
- Threat actor TTP and indicator identification using large data sources.
- Custom signature development
- Packet analysis
Clearance: Must possess a current/active Top Secret clearance, with the ability to obtain a TS/SCI
Desired Certifications and Skills:
GCIH, GCFA, GREM, CISSP, CEH
Windows and Linux operating systems, ArcSight, Scripting languages (PERL; Powershell, etc),