Cyber Threat Intelligence Analyst, General Dynamics Mission Systems, Bwi Airport, MD


General Dynamics Mission Systems -
N/A
Bwi Airport, MD, US
N/A

Cyber Threat Intelligence Analyst

Job description

Basic Qualifications

Bachelor s degree in a related specialized area or field or the equivalent is required plus a minimum of 5 years of relevant experience; or Master's degree plus a minimum of 3 years of relevant experience

CLEARANCE REQUIREMENT:

A Department of Defense TS/SCI security clearance is required at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required.

Responsibilities for this Position

The responsibility is career-defining. So is the opportunity. At General Dynamics Mission Systems, we invent the technologies, products and services, that help our nation s heroes keep our nation safe. The work is so advanced, our teams regularly redefine innovation and excellence for the world. If you re looking for a challenge, you ve just found it.

The selected candidate will serve as a cyber intelligence analyst within the Defense Cyber Crime Center (DC3) Analytical Group. The analyst provides the customer with expertise in Intelligence sources, collection methods and analytic techniques. The analyst collaborates among interagency partners to identify malicious activity and provide analytic support to LE/CI investigations and operations. The analyst performs analysis on existing and emerging advanced persistent threat organizations, actors, and malware.

Ideal candidate is an experienced cyber intelligence analyst or law enforcement/counterintelligence (LE/CI) analyst or agent, who has applied their mastery of cyber threat intelligence, intelligence analysis techniques, and sources and methods to produce high quality analysis products for the last 5 years.

REQUIRED SKILLS:

  • Bachelor s degree from an accredited college in a related discipline, or equivalent experience/combined education, with 5 years of professional experience; or 3 years of professional experience with a related Master s degree.
  • Experienced in the following areas: network communication using TCP/IP protocols, basic system administration, basic understanding of malware (malware communication, installation, malware types), intermediate knowledge of computer network defense operations (proxy, Firewall, IDS/IPS, router/switch) and open-source information collection.
  • Experience with Domain Name Service records.
  • Experienced with Cyber Threat Intelligence principles to include indicators of compromise (IOC) types, indicator pivoting and indicator attribution strength.
  • Experience with intelligence analysis methods, develop hypothesis, prove/disprove relationships, always ask why, defend your analysis, and apply attribution to cyber threat activity.
  • Experience with confidence-based assessments for purposes of attribution based on their technical analysis of network traffic, multi-source data, malware and system forensic analysis.
  • Experienced presenting technical information and analysis to groups up to 50 persons on a quarterly basis and experience briefing smaller groups up to 10 persons on a weekly basis

DESIRED SKILLS:

  • Formal training as an intelligence analyst in any discipline graduate of US Govt intelligence analysis course: CAC, IBC, Kent School, IC 101, Analysis101, Army, Navy, Air Force, etc.
  • Experience applying Kill Chain analysis, Cyber Intelligence Preparation of the Environment (CIPE) modeling, or Diamond modeling of cyber threat activity
  • Certifications (any): CISSP, CEH, Security+, SANS certification(s) Network+, CCNA
  • Advanced NETFLOW and PCAP Analysis
  • Advanced Data Visualization proficiency leveraging COTS/GOTS tools
  • Technical Skills proficiency: Python language, encryption technologies/standards
  • Intermediate malware analysis or digital computer forensics experience
  • Any type of Cyber related Law Enforcement or Counter-intelligence experience
  • Existing Subject Matter Expert of Advanced Persistent Threat activity
  • Experience using COTS/Open-Source tools: Novetta Cyber Analytics, Mitre ChopShop and/or ARL DSHELL
  • Analyst experience in Federal Cyber Center, NSA, or Corporate CIRT
  • Candidate must be able to identify analytic bias

#CJ3

Company Overview

General Dynamics Mission Systems (GDMS) engineers a diverse portfolio of high technology solutions, products and services that enable customers to successfully execute missions across all domains of operation. With a global team of 12,000+ top professionals, we partner with the best in industry to expand the bounds of innovation in the defense and scientific arenas. Given the nature of our work and who we are, we value trust, honesty, alignment and transparency. We offer highly competitive benefits and pride ourselves in being a great place to work with a shared sense of purpose. You will also enjoy a flexible work environment where contributions are recognized and rewarded. If who we are and what we do resonates with you, we invite you to join our high performance team!

General Dynamics is an Equal Opportunity/Affirmative Action Employer that is committed to hiring a diverse and talented workforce.EOE/Disability/Veteran


Full-time 2024-07-14
N/A
N/A
USD

Privacy Policy  Contact US
Copyright © 2023 Employ America All rights reserved.