Cyber Threat Analyst / Engineer (DDA)

5 - 7 years experience  • 

Salary depends on experience
Posted on 02/23/18
Martinsburg, WV
5 - 7 years experience
Salary depends on experience
Posted on 02/23/18

Job Duties and Responsibilities    

Ready to join ManTech and help our Department of Veterans Affairs customer maintain a strong Cyber Security posture?

The Cyber Security Analyst will join our team in protecting the Department of Veterans Affairs computer systems and networks.  The selected candidate must have experience collaborating with IT users and customers to document and strategize on improvements to current business processes (i.e., business process reengineering).  This member of our team will be responsible for delivering market research on conditions impacting the operational efficiency of the organization and identifying root causes for process improvement.

The successful candidate must be well-versed in security operations, cyber security tools, and Open Source information gathering from public and private sources. The candidate will provide operational support on expert level analysis in regards to Advanced Persistent Threats (APTs), Indicators of Compromise (IOC), Intelligence Gathering and sharing this information with other formalized partners. Duties and responsibilities may include, but are not limited to:

    Gather, extract, and disseminate open source intelligence (OSINT) on threat actors targeting the VA, health care industry, government agencies in general, as well as public sector.
    Work with industry partners to gather and share intelligence. Apply intelligence to the VA network and systems to proactively identify potential cyber threats.
    Provide proactive event monitoring/event management/configuration of the following security tools for targeted threats and malicious activity including but not limited to: Splunk, Palo Alto Networks, McAfee EPO, Cisco Ironport, Netscout, Sourcefire Defense Center and Bigfix
    Determine if an event meets the criteria for additional cyber hunt investigation and/or constitutes a security incident subject to investigation
    Review audit logs and identify any unusual or suspect behavior
    Provide targeted attack detection and analysis, including the development of custom signatures and log queries and analytics for the identification of targeted attacks
    Develop and execute custom scripts to identify host-based indicators of compromise
    Provide advanced technical capabilities to senior leadership, including Big Data Analytics, and Predictive Intelligence
    Provide proactive APT hunting, incident response support, and advanced analytic capabilities
    Profile and track APT actors that pose a threat to the organization in coordination with threat intelligence support teams
    Support the incident response process by providing advanced analysis services when requested to include recommending containment and remediation processes, independent analysis of security events, and reporting of identified incidents to Incident Handling (IH)
    Provide all VA cyber task areas with actionable intelligence and serve as the threat dissemination hub.
    Experience in cyber investigations and information gathering techniques, required
    Experience briefing C-level executives on current threat landscapes with future analytic predictions
    In depth understanding of NIST SP 800-61, US CERT and Office of Management and Budget (OMB) standards
    Experience interpreting and implementing cyber security regulations

Qualifications   

 Requires Bachelor¿s degree or equivalent and five to seven years of related experience. Minimum of two years experience in technology/tools specific to the target platforms.

95251BR

Not the right job?
Join Ladders to find it.
With a free Ladders account, you can find the best jobs for you and be found by over 20,0000 recruiters.