Cyber Threat Analyst (Mid- Sr)

OVERVIEW: phia LLC is seeking skilled mid-level career cyber threat analysts to support a large Federal Security Operations Center (SOC) and its 24x7 SOC mission.
DUTIES
+ Conduct all-source research on cyber threats; evaluate both technical and Intel reporting for cyber threat activities of interest
+ Track Advanced Persistent Threats activities and TTPs; prepare cyber threat assessments based on research and unique data set and events
+ Assist in facilitating the sharing of cyber threat of information to the LE, CI, and other Government entities; execute activities to support inquiries from customers and mission partners
+ Analyze and vet cyber threat indicators, and input these indicators into custom databases for additional processing
+ Collaborate with other technical personnel (e.g. forensic analysts, network analysts) to gain better understanding and knowledge of APTs
+ Assist in the development and maintenance of analytical procedures and processes in support of changing operational requirements
+ Develop and lead execution of stakeholder analyst-to-analyst feedback processes to understand the needs of the constituency
+ Develop and maintain cooperative relationships with sponsors and collaborators, and assist them in strengthening their analysis and cyber defense capabilities, providing on-site support as necessary
+ Engage critical infrastructure stakeholders to identify their requirements for participation in cyber information sharing and collaboration programs and help lead to meet these requirements
+ Foster collaboration and information sharing amongst entities within the community
+ Work to continually improve the tools, processes, and systems utilized within the community
+ Produce high-quality whitepapers, presentations, briefings, and executive summaries to be used by Senior U.S. Government officials
Requirements
KEY REQUIREMENTS
+ Active SSBI, SCI eligible (Must be a U.S. Citizen)
+ Bachelor of Science or IT related field of study
+ 7 or more years of relevant work experience in cyber security
+ Strong communications and technical writing skills
+ Strong team player with the ability to conduct daily duties autonomously
DESIRED
+ Nine (9) or more years of relevant work experience in cyber security
+ Familiarity with SOC/NOC operations
+ Familiarity with Kill Chain for incident response
+ Familiarity with security technologies such as IDS, IPS, and HBSS
+ Understanding of network and system administration
+ Experience with database (e.g. MS Access, SQL) and/or portal administration (e.g. SharePoint)
+ Customer service experience
+ CISSP certification or equivalent work experience
WORK SCHEDULE: Shift, but 2nd shift (2PM-10:30PM Mon.-Fri.) is especially desireable at this time.
WORK LOCATION: Arlington, Fairfax, or McLean VA
TRAVEL: N/A
TELEWORK ELIGIBILITY: N/A
SECURITY REQUIREMENTS: Active SSBI (Top Secret); eligible for SCI and DHS EOD
Benefits
phia LLC ("phia") is a Northern Virginia based, 8a certified small business established in 2011 with focus in Cyber Intelligence, Cyber Security/Defense, Intrusion Analysis & Incident Response, Cyber Architecture & Capability Analysis, Cyber Policy & Strategy, Information Assurance/Security, Compliance, Certification & Accreditation, Communications Security, Traditional Security, and Facilities Security. phia also provides cyber operations support functions such as: Program and Process Management, Engineering, Development, and Systems Administration that allows for Cyber Operations to efficiently integrate our customer?s missions and objectives. phia supports various agencies and offices within the Department of Defense (DoD), Federal government, and private/commercial entities.
phia offers excellent benefits to enhance the work-life balance, these include the following:
+ Medical Insurance
+ Dental Insurance
+ Vision Insurance
+ Life Insurance
+ Short Term & Long Term Disability
+ 401k Retirement Savings Plan with Company Match
+ Paid Holidays
+ Paid Time Off (PTO)
+ Tuition and Professional Development Assistance e8b2669eb0e54ce4a7c12f0d004a5e19

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

SIGINT Cyber Discovery Analyst, Mid
Alexandria, VA Booz Allen Hamilton Inc.
Cyber Threat Analyst - Active TS Clearance
Arlington, VA CSRA Inc.
Cyber Threat Analyst
Fairfax, VA Booz Allen Hamilton Inc.
Open Source Cyber Threat Analyst
McLean, VA Booz Allen Hamilton Inc.
Cyber Threat Analyst
Chantilly, VA ManTech