Enable job alerts via email!

Junior Cybersecurity Threat Intelligence Analyst

ManTech

Herndon (VA)

On-site

USD 75,000 - 95,000

Full time

13 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

A leading cybersecurity firm is seeking a motivated Junior Cybersecurity Threat Intelligence Analyst in Virginia. The role involves designing and improving a cybersecurity program, monitoring threats, and collaborating with various teams to enhance security posture. Ideal candidates will have a degree in relevant fields and experience with threat hunting tools, ensuring protection against advanced cyber threats. This position offers an exciting opportunity to work in a dynamic environment focused on national security.

Qualifications

  • 2+ years of experience in cybersecurity focusing on SIEM engineering and operations.
  • 8570 compliant certifications such as CISSP, CISM, or similar preferred.
  • Strong understanding of threat actor TTPs and attack vectors.

Responsibilities

  • Collaborate with incident response teams to investigate and remediate identified threats.
  • Monitor open source intelligence feeds to identify emerging threats and risks.
  • Develop threat intelligence reports to improve detection capabilities.

Skills

Threat hunting
Cybersecurity analysis
Network protocols
System logs analysis

Education

Bachelor’s degree in Computer Science
Bachelor’s degree in Cybersecurity
Bachelor’s degree in Information Technology

Tools

Splunk
ELK Stack
CrowdStrike
Carbon Black

Job description

**ManTech** seeks a motivated, career and customer-oriented **Junior Cybersecurity Threat Intelligence Analyst** to join our team in the **DC, Maryland, and Virginia (DMV) area** .

In this role you will support the design, development, implementation, and improvement of the enterprise Cybersecurity Threat Intelligence (CTI) program. Duties may include: monitoring open source intelligence feeds, sources, websites, etc., to identify emerging and zero-day threats and potential risks to enterprise security; compiling and synthesizing reports, analyzing, e.g., threat vectors and method of attack via MITRE ATT&CK and the cyber kill chain; composing emails and strategic communications to inform subscribers and stakeholders of emerging risks, etc. The Cyber Security Threat Intelligence Analyst will collaborate with other internal and external POCs and teams improving the security posture of the DHS enterprise.

**Responsibilities include, but are not limited to:**

+ Collaborate with incident response teams to investigate, analyze, and remediate identified threats; Stay current with the latest cyber threat intelligence, trends, and technologies

+ Identify and assess the capabilities and activities of cyber criminals or foreign intelligence entities; design and administer procedures in the organization that sustains the security of the organization’s data and access to its technology and communications systems

+ Monitor open source intelligence feeds, sources, websites, etc., to identify emerging and zero-day threats and potential risks to enterprise security; compiling and synthesizing reports, analyzing, e.g., threat vectors and method of attack via MITRE ATT&CK and the cyber kill chain

+ Proactively search for and identify cyber threats, including advanced persistent threats (APTs), that could compromise DHS networks and systems

+ Analyze network traffic, system logs, and other data sources to detect anomalies and indicators of compromise (IOCs)

+ Develop and provide threat intelligence reports, advise and use methodologies, techniques, and tools to improve detection capabilities

+ Create and refine threat detection use cases and correlation rules within SIEM and other security tools

**Minimum Qualifications:**

+ Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field

+ 2+ years of experience in cybersecurity with a focus on SIEM engineering and operations

+ Proficiency with threat hunting tools and platforms (e.g., Splunk, ELK Stack, CrowdStrike, Carbon Black).

+ Strong understanding of network protocols, system logs, and security event correlation.

+ Experience in analyzing malware, attack vectors, and threat actor TTPs.

+ 8570 compliant certifications; relevant certifications such as CISSP, GCIH, GCFA, GCIA, or similar are highly desirable.

+ Relevant certifications such as CISSP, CISM, CEH, or SIEM-specific certifications (e.g., Splunk Certified Power User) are highly desirable

**Preferred Qualifications:**

+ Previous Network Operations Center (NOC) or IT Operations experience

+ Familiarity with DHS policies and procedures.

+ Knowledge of broader cybersecurity frameworks (e.g., NIST, ISO 27001).

+ Understanding of ITIL4 principles

+ Master’s Degree

**Clearance Requirements:**

+ Must have a current/active Secret clearance with the ability to obtain and maintain a TS/SCI.

+ The ability to obtain and maintain a DHS EOD suitability is required prior to starting this position.

**Physical Requirements:**

+ Must be able to remain in a stationary position 50%

+ Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer

+ The person in this position needs to occasionally move about inside the office to access file cabinets, office machinery, etc.

ManTech International Corporation, as well as its subsidiaries proactively fulfills its role as an equal opportunity employer. We do not discriminate against any employee or applicant for employment. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.

If you are a qualified individual with a disability and require a reasonable accommodation to apply for a position with ManTech through its online applicant system, please email us at careers@mantech.com and provide your name and contact information.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Threat Intelligence Analyst (Sr., Jr. Multiple Roles)

Fabergent

Herndon

On-site

USD 90,000 - 130,000

4 days ago
Be an early applicant

Entry Level Intelligence Analyst

Lensa

Washington

On-site

USD 63,000 - 109,000

Yesterday
Be an early applicant

CWMD Junior Intelligence Analyst

Lensa

Arlington

On-site

USD 63,000 - 109,000

2 days ago
Be an early applicant

BI Analyst

Synectics for Management Decisions Inc

Falls Church

Remote

USD 80,000 - 120,000

4 days ago
Be an early applicant

Business Analyst / Data

Alpha Omega

Vienna

Remote

USD 81,000 - 140,000

6 days ago
Be an early applicant

Junior Intelligence Analyst - TS

Lensa

Vienna

On-site

USD 60,000 - 80,000

Yesterday
Be an early applicant

Entry Level Intelligence Analyst

Amentum

Washington

On-site

USD 65,000 - 85,000

2 days ago
Be an early applicant

Junior Intelligence Analyst

SGI Global, LLC

Falls Church

On-site

USD 60,000 - 80,000

2 days ago
Be an early applicant

Cybersecurity Threat Intelligence Analyst

hackajob

Herndon

On-site

USD 80,000 - 120,000

7 days ago
Be an early applicant