Enable job alerts via email!

Cyber Threat Analyst

Davita Inc.

Linthicum (MD)

On-site

USD 86,000 - 138,000

Full time

Yesterday
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

Davita Inc. is seeking a Cyber Threat Analyst in Linthicum, MD, to support the Defense Cyber Crime Center. The analyst will conduct comprehensive threat analyses, contribute to developing threat models, and lead research initiatives. Ideal candidates will have substantial cybersecurity experience, a current Secret clearance, and possess key analytical and communication skills necessary for collaboration and reporting.

Qualifications

  • Active/current Secret (TS/SCI preferred) security clearance.
  • 7+ years of experience with an Associate's degree; 5+ years with a Bachelor's; 3+ years with a Master's.
  • Relevant certifications (e.g., CYSA+, CISSP, CEH, CISM) preferred.

Responsibilities

  • Conduct threat analyses supporting the Defense Cyber Crime Center (DC3).
  • Develop analytical threat models and provide guidance to threat studies team.
  • Prepare and present reports to customer representatives.

Skills

Cybersecurity analysis
Incident response
Digital forensics
Analytical skills
Problem-solving
Communication
Team collaboration

Education

Bachelor's degree
Associates degree
Master's Degree

Tools

Jira
Virus Total
SIEM
IDS/IPS
Forensic analysis tools

Job description







Cyber Threat Analyst




Job Locations

US-MD-Linthicum


















Requisition ID
2025-157282

Position Category
Intel and Threat Analysis

Clearance
Secret





Responsibilities




This Cyber Threat Analyst position supports the Defense Cyber Crime Center (DC3) and participates as a team member performing threat analyses based on knowledge of cybersecurity and concepts supporting intelligence analysis requirements for all-source cyber analysis and reporting. Contributes to development of analytical threat models and provides functional guidance and direction to threat studies team in overall conduct of project(s). Leverages scanning tools (i.e., VirusTotal) to conduct suspicious file scanning; performing queries, pivoting on indicators, and malware analysis on characteristics (Message-Digest Algorithm 5 (MD5), Secure Hash Algorithm 1 (SHA1), file size, file name, file paths, etc.). Work activities are performed under general guideline and direction. Supports team performing expert-level research and analysis of intelligence and related data support of threat studies. Provides advice, guidance and direction to threat studies team. Prepares, submits and presents reports and issue papers to customer representatives. Requires knowledge of advanced threat analysis technology in such areas as telecommunications, computer science, electronic warfare. Requires a detailed knowledge of Department of Defense and service level (Army, Navy, Air Force) intelligence communities, including collection methods and production resources and responsibilities. Requires skills and abilities in supervising the handling classified information. Requires strong knowledge of technology related to cybersecurity. Provides leadership, guidance, and direction to less-senior analysts. Uses Jira to to track analysis tasks and communicate status. May leverage tools such as Virus Total, Kibana, Google Threat Intelligence, Recorded Future, etc. to obtain, fuse, and analyze cyber threat intelligence.






Qualifications




    Clearance requirement: Active/current Secret (TS/SCI preferred).
  • Education: Associates degree and 7+ years of experience; OR Bachelor's degree and 5+ years of experience; OR Master's Degree and 3+ years of experience. Or 0 years with PhD. However, four (4) years of additional relevant experience or specialized training will be considered in lieu of a Bachelor's degree. Relevant certifications (e.g., CYSA+, CISSP, CEH, CISM) are preferred.
  • Experience: Experience in cybersecurity analysis, incident response, or digital forensics. Requires a detailed knowledge of Department of Defense and service level (Army, Navy, Air Force) intelligence communities, including collection methods, production resources, and responsibilities. Knowledge of advanced persistent threats (APTs), Tactics Techniques and Procedures (TTPs)
  • Technical Skills: Proficiency in cybersecurity tools and technologies (e.g., Virus Total, Domain Tools, SIEM, IDS/IPS, forensic analysis tools). Knowledge of operating systems, network protocols, cyber threat actors, cyber kill chain, Indicator of Compromises (IOCs) and MITRE ATT&CK framework
  • Analytical Skills: Requires skills and abilities in supervising the handling classified information. Strong analytical and problem-solving skills with the ability to interpret complex data and provide actionable insights.
  • Communication Skills: Excellent written and verbal communication skills, with the ability to convey technical information and threat impacts to non-technical audiences and stakeholders. Requires prior experience briefing information to decision-makers and leaders. Uses Jira to track analysis tasks and communicate status.
  • Team Player: Ability to work effectively in a team environment and collaborate with various stakeholders, including those in the DIB. Provides mentorship to less-senior analysts.





Peraton Overview




Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.






Target Salary Range




$86,000 - $138,000. This represents the typical salary range for this position based on experience and other factors.




EEO




EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.



Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Senior Threat Intelligence Analyst, SEAR

Apple Inc.

Baltimore

Remote

USD 114,000 - 212,000

4 days ago
Be an early applicant

Threat Analyst 2 (Japan)

Sophos

Remote

USD 80,000 - 110,000

6 days ago
Be an early applicant

Threat Analyst 2

Sophos

Remote

USD 65,000 - 108,000

6 days ago
Be an early applicant

Threat Analyst 1

Sophos

Remote

USD 56,000 - 93,000

7 days ago
Be an early applicant

Cyber Threat Analyst

Coalfire Federal

Washington

Remote

USD 80,000 - 110,000

30+ days ago

Cyber Threat Analyst

Amentum

Washington

On-site

USD 90,000 - 130,000

Today
Be an early applicant

Team Lead, Threat Analyst

Sophos

Remote

USD 90,000 - 150,000

6 days ago
Be an early applicant

Cyber Threat Analyst

Nava

Great Falls Crossing

On-site

USD 85,000 - 130,000

9 days ago

Cyber Threat Analyst

AnaVation, LLC

Great Falls Crossing

On-site

USD 80,000 - 120,000

9 days ago