Full-time | Contract
Springfield, VA
Job description
SkyeTech Solutions llc, is currently seeking a talented CI Cyber Threat Technical Analyst to support an exciting mission located in Springfield Virginia.
This role is primarily onsite with telework options.
Responsibilities and Duties
The ideal candidate will serve as CI Cyber Threat Technical Analyst and to produce, weekly threat reports, eight monthly threat reports, three quarterly threat reports, and one annual threat study for their specific focus or area. In addition, each analyst will average six reports of inquiry (ROI) and or requests for information (RFI) and publish or contribute to nine Intelligence Information Reports (IIR) annually. Additionally, the CI Cyber Technical Analysts duties are as follows:
Support team members in completing forensics reports, CI Cyber Inquiries, and monthly, quarterly, and annual CI Cyber Threat reports. Support includes, but is not limited to, written and technical analysis that contributes to the understanding of a particular threat or situation.
Identify, analyze, define, and coordinate user, customer and stakeholder needs and translate them into technical requirements.
Detect anomalous activity through network data analysis.
Develop custom scripts/programs for automated cyber analytical tools.
Record best practices, lessons-learned, processes and procedures, and other pertinent quality topics in appropriate formats.
Evaluate Intrusion Detection, incident tickets, event and log analysis, security change tracking and other network security systems and devices.
Provide written reports based on findings.
Perform work without appreciable direction and exercising considerable latitude in the determination of technical objectives of assignments.
Participate in special projects as required.
Assist in the development and delivery of malware threat awareness products and briefings.
Participate in technical meetings and working groups to address issues related to malware threats and vulnerabilities.
Collaborate with customers and team members consisting of computer security and CI investigators and forensic analysts and other internal and external organizations to facilitate a premier malware program.
Thoroughly investigate instances of malicious code to determine attack vector, payload, potential origin, and determine extent of damage and data exfiltration.
Develop analysis and make recommendations for the purchase of software that will mitigate malware intrusions.
Identify risks to computer systems and make recommendations for corrective actions.
Coordinate CI Cyber activities originating from Enterprise Incident Response Events.
Conduct liaison between CI Office and CSOC.
Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures.
Required Skills
Level III: Shall possess at least 5 years of network analysis experience. Applicants shall possess experience with industry network analysis tools, such as Wireshark.
Shall possess a Bachelor s Degree in Computer Science, Engineering, or a related technical discipline. Acquire 8570 approved cert within six months of hire.
Education
Possess post-graduate degree in Computer Science, Engineering, or a related technical discipline.
Experience with Incident Response, Pcap and malware analysis.
Experience with Cyber Threat Intelligence
Clearance Required
Active TS/SCI Clearance (CI Poly preffered but not required to start).
This role is in support of existing efforts with possibilities to extend to a new effort that is contingent upon contract award.
Job Types: Full-time, Contract
Pay: $59,669.00 - $110,000.00 per year
Benefits:
Compensation Package:
Schedule:
Experience:
License/Certification:
Security clearance:
Work Location: In person