Enable job alerts via email!

Cyber Threat Intelligence Analyst

Leidos

Virginia, Ashburn (MN, VA)

On-site

USD 80,000 - 110,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is seeking a dedicated cybersecurity analyst to join their Security Operations Center. In this pivotal role, you will conduct in-depth cyber threat analyses, develop scripts for threat detection, and support incident response efforts. Your expertise will enhance the organization's cybersecurity posture and protect critical IT assets from evolving threats. The ideal candidate will possess a strong background in security monitoring solutions and scripting, with a proven ability to work independently. If you are passionate about cybersecurity and ready to make a significant impact, this opportunity is for you!

Qualifications

  • Must have Top Secret Clearance Eligibility and 8-12 years of IT experience.
  • Experience in cybersecurity analysis and security monitoring solutions is essential.

Responsibilities

  • Conduct cyber threat analysis and develop actionable intelligence.
  • Support incident response and threat intelligence activities.

Skills

Cyber Threat Analysis
Incident Response
Technical Analysis
Scripting (VB, Python, C++, HTML, XML)
Security Monitoring Solutions
Self-motivated

Education

Bachelor's in IT-related field
Advanced Degree in Cyber Security

Tools

Analyst1

Job description

Description

The U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible for preventing, identifying, containing, and eradicating cyber threats to CBP networks through monitoring, intrusion detection, and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial internet connections, public-facing websites, wireless, mobile/cellular, various cloud environments, security devices, servers, and workstations. The CBP SOC is responsible for the overall security of CBP Enterprise-wide information systems and collects, investigates, and reports any suspected and confirmed security violations.

Primary Responsibilities:

  1. Conduct cyber threat analysis, identifying mitigation and/or remediation courses of action; developing actionable intelligence used to protect organizational IT assets; and trending cyber threat metrics for leadership situational awareness.
  2. Maintain a comprehensive understanding of the cyber threat landscape, including identifying and analyzing cyber threat actors and/or activities to enhance the cybersecurity posture of the organization’s IT operating environment.
  3. Identify, track, investigate, and write technical products for dissemination to stakeholders regarding high-priority threat campaigns, malicious actors, APTs, emerging threats, etc.
  4. Analyze and track the cyber threat landscape, including identifying and analyzing cyber threat actors, APT TTPs, and/or activities to enhance the cybersecurity posture of the organization’s IT operating environment.
  5. Provide support to the Security Operations Center during incident response and threat intelligence activities, including cyber threat analysis support, research, and recommending relevant remediation and mitigation.
  6. Develop scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML, or other types most appropriate for the task.
  7. Conduct trending and correlation of various cyber intelligence sources for the purposes of indicator collection, shifts in TTPs, attribution, and establishing countermeasures to increase cyber resiliency.

Will be responsible for:

  1. Producing high-quality technical and non-technical products, briefings, whitepapers, etc., with minimal supervision and emphasis on effective/accurate reporting on product topics.
  2. Maintaining situational awareness of emerging threats, zero days, vulnerabilities, and other threats against customer systems, networks, and assets.
  3. Processing technical data from various sources and fusing the data with intelligence reporting to improve the security posture of the customer, as well as managing Threat Intelligence tools such as Analyst1.

Basic Qualifications:

  1. The candidate must currently possess a Top Secret Clearance Eligibility with the ability to obtain a TS/SCI. In addition to the clearance requirement, all CBP personnel must have a current or be able to favorably pass a 5-year background investigation (BI).
  2. BS in IT-related field or higher and 8-12 years’ experience in an information technology field with a minimum of 5 years of experience as a Tier II senior cybersecurity analyst performing intelligence analysis, collection management, and technical analysis. Additional years of experience and/or security certifications may be substituted in lieu of a degree.
  3. 5+ years of recent experience with host-based and network-based security monitoring solutions, including security content recommendation or development (host-based and network signatures).
  4. 2 years recent experience with host-based and network-based security monitoring using cybersecurity capabilities.
  5. Must be experienced in developing scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML, or other.
  6. Ability to work independently with minimal direction; self-starter/self-motivated.
  7. Must be a US Citizen.

Required certifications:

The candidate should have at minimum ONE of the following certifications:

  1. Certified Information System Security Professional (CISSP).
  2. SANS - GCIA – Intrusion Analyst.
  3. SANS - GREM – Reverse Engineering Malware.
  4. SANS - GISF – Security Fundamentals.
  5. SANS - GXPN – Exploit Researcher and Advanced Penetration Tester.
  6. SANS - GMON – Continuous Monitoring Certification.
  7. OSCP (Certified Professional).
  8. OSCE (Certified Expert).
  9. OSWP (Wireless Professional).
  10. OSEE (Exploitation Expert).
  11. CCSP – Certified Cloud Security Professional.
  12. LPT – Licensed Penetration Tester.
  13. ECSA – EC-Council Certified Security Analyst.
  14. Cyber Analyst Course.

Preferred Qualifications:

  1. A minimum of five (5) years of hands-on experience with experience in the last two (2) years that includes host-based and network-based security monitoring using cybersecurity capabilities.
  2. Previous DOD, IC, or Law Enforcement Intelligence or Counter Intelligence Training/Experience.
  3. Knowledge of Structured Analytic Techniques.
  4. Degree in Applied Intelligence or Advanced Degree in Cyber Security or related field.

Clearance:

  1. All Department of Homeland Security CBP SOC employees are required to favorably pass a 5-year (BI) Background Investigation.
Original Posting:

March 13, 2025

For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.

Pay Range:

The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.