Role: Cyber Threat Intel Analyst (W2 Position)
Location: Crownsville, MD (on-site)
Duration: 6+ months
Job Description:
Need 7 years of experience as a Cyber Threat Intel Analyst
Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise.
Coursework and previous experience directly related to Cyber Operations environment.
Experience with Splunk, ServiceNow, Recorded Future, Anomali ThreatStream, and other cybersecurity tools as required.
Ability to work in a team environment ability to taking initiative to understand and master new operating systems, security applications and open-source tools.
Knowledge with Windows and Linux operating systems and common applications, working knowledge of and experience in detecting malicious code and methods of infection (ports, attachments, etc.).
Knowledge of information systems security concepts and technologies; network architecture and tools; general database concepts; document management; hardware and software troubleshooting; intrusion tools; and open-source alternatives.
Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects.
Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).
Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).
Additional Requirements:
At least one certification from the CSSP Incident Responder Category (CEH, CFR, CCNA Cyber Ops, CCNA-Security, CHFI, CySA+ **, GCFA, GCIH, SCYBER, PenTest+)