Cyber Threat Intel Analyst

Vicksburg, MS |Full Time
In order to apply for this or any other job you will need to log in.

Position Description

Dynetics is seeking a talented Cyber Threat Intel Analyst to join a diverse team to create unique solutions for complex problems. With offices across the United States engaging in the defense, space, cyber and commercial fields, Dynetics provides responsive, cost-effective engineering, scientific and IT solutions.

This work location can be in Vicksburg, MS, Hillsboro OR or other USACE District locations.

Performs as the Senior Technical SME in area of cyber threat intelligence. Incorporates threat intelligence into countermeasures to detect and prevent intrusions and malware infestation. 

Identifies threat actor tactics, techniques and procedures and based on indicators develops custom signatures and blocks. 

Interacts with the ACE-IT CIRT for incident response, recovery, and prevention. Interacts with the ACE-IT SOC and NOC personnel to maximize cyber threat prevention measures, enhance audit and logging standards, and enforce and monitor effective cyber security policies and configurations and security event management within the logging and SIEM infrastructure.

• Implement the core Security Intelligence Center (SIC) concepts (SOC vs. SIC, Cyber Kill Chain, APT)
• Have a strong understanding of the enterprise network and how each component contributes to Security Intelligence
• Have a strong understanding of the tools & techniques necessary to efficiently identify trends and extract indicators from large data sources
• Understand and employ the Cyber Kill Chain
• Know the importance how to be in control of the adversary’s intrusion steps
• Know how to identify and create mitigations for the Cyber Kill Chain grid
• Understand the concept of APT
• Understand what makes APT different than traditional cyber threats (more examples)
• Know examples of specific intrusion techniques used by APT adversaries
• Recognize what you’ll need to know to prevent or identify APT intrusions
• Understand key networking concepts relevant to the Security Intelligence process
• Understand key forensics and incident response concepts critical to the Security Intelligence process
• Understand and work with various categories of electronic evidence including media, email, and networks
• Study the detection and prevention of intrusion and attacks
• Understand structured digital evidence collection and evaluation
• Identify network architectures and select network components
• Implement a full network infrastructure including routers, switches, gateways, and firewalls
• Configure network devices and optimize network performance
• Maintain network devices, design, and infrastructure
• Understand concepts of packet analysis
• Examine different methods of policy creation, implement a security policy and create a policy document
• Navigate the command line using specific expressions to manipulate data
• Handle and organize disparate data about detections, attacks, and attackers
• Discovery techniques and vetting of new intelligence
• Build better actionable intelligence from data


Basic Qualifications

Requires Bachelors Degree from an accredited university/college in Computer Science, Computer Engineering or related field and 4 to 8 years of prior relevant experience or Masters with 2 – 6 years of prior relevant experience. 

IAT III Certification and CSSP IR Certification Required

Relevant Experience required: Computer network defense technologies and Cyber Kill Chain

  • Threat actor TTP and indicator identification using large data sources.
  • Custom signature development 
  • Packet analysis

Other Qualifications

Security Requirements

U.S. Citizenship and a current Final Top Secret/SSBI Clearance is required with the ability to meet applicable program security eligibility requirements for the position. Must be able to maintain a Final Top Secret Clearance along with meeting and maintaining program security eligibility.

Job Number:
Closing Date:

You might also like