Abile Headquarters

  • Cyber Threat Analyst Tier 2 - ESOC

    Job Locations US-VA-Lorton
    Posted Date 6 days ago(1/10/2019 2:27 PM)
    Job ID
    2018-1218
    # of Openings
    1
    Category
    Information Technology
  • Overview

    Abile Group has an exciting and challenging opportunity for a Cyber Threat Analyst supporting an Intelligence Community Customer. 

     

    Abile Group, Inc. was formed in July 2004 to partner with the Intelligence Community and their Contractors in the areas of Enterprise Analytics & Performance Management, IT & Systems Engineering and Program & Project Management. We have significant experience with the Federal Government and are an EDWOSB dedicated to our employees and clients.  We are looking for high performing employees who enjoy providing advice and guidance along with solutions development and implementation support, crafted by combining industry best practices with the clients’ subject matter experience and Abile’s breadth of expertise. Abile Group is an Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, veteran status, disability, or national origin.

     

    The right candidate will possess the below skills and qualifications and be ready to handle all responsibilities independently and professionally.

    Responsibilities

    Department of Homeland Security (DHS), Security Operations Center (SOC) Support Services is a US Government program responsible to monitor, detect, analyze, mitigate, and respond to cyber threats and adversarial activity on the DHS Enterprise. The DHS SOC has primary responsibility for monitoring and responding to security events and incidents detected at the Trusted Internet Connection (TIC) and Policy Enforcement Point (PEP) and is responsible for directing and coordinating detection and response activities performed by each Component SOC. Direction and coordination are achieved through a new shared DHS incident tracking system and other means of coordination and communication.

    The DHS SOC Support Services Program has a critical need for a Tier 2 Cyber Threat Analyst who will working 12 hours shifts - Fronts which is Sunday, Monday, Tuesday, and alternating 8 hours on Wednesday or Backs which is Thursday, Friday, Saturday and alternating 8 hours on Wednesday.

    Tier 2 Cyber Threat Analyst will be supporting these specialized areas: - Email security - Digital media forensic - Monitoring and detection - Incident Response - Vulnerability assessment and pen test - Cyber intelligence analysis Supports detection, containment, and eradication of APT activities targeting customer networks. Process community reporting, conduct link analysis, and collaborate with other Government cyber fusion teams. Publish intelligence products to inform network defenders about APT activities, new detection methods, among other topics of interest. This position location is in the Washington Metropolitan Area.

     

    Qualifications

    Clearance Required: Minimum of current Top Secret clearance with ability to obtain TS/SCI Clearance. In addition to specific security clearance requirements all Department of Homeland Security SOC employees are required to obtain an Entry on Duty (EOD) clearance to support this program.

     

    Degree and Years of Experience: Bachelors degree in Computer Science, Engineering, Information Technology, Cyber Security, or related field. Minimum of 7 years of professional experience in incident detection and response, malware analysis, or cyber forensics. In addition, minimum of five (5) years of specialized experience in one or more of the following areas:

    • Email security
    • Digital media forensic
    • Monitoring and detection
    • Incident Response
    • Vulnerability assessment and pen test
    • Cyber intelligence analysis

    Required Certifications:

    • One of the following: SANS GIAC: GCED, GCIA, GCFA, GPEN, GWAPT, GCFE, GREM, GXPN, GMON or GCIH ISC2 CCFP, CCSP, CISSP CERT CSIH EC Council: CHFI, LPT, ECSA, Offensive Security: OSCP, OSCE, OSWP and OSEE EnCase: EnCE Dod 8570: IAT L3, CNDSP Analyst or IR Carnegie Mellon: CCSIH

    Required Skills:

    • Extensive experience analyzing and synthesizing information with other relevant data sources, providing guidance and mentorship to others in cyber threat analysis and operations, evaluating, interpreting, and integrating all sources of information, and fusing computer network attack analyses with counterintelligence and law enforcement investigations.

    Desired Skills: 

    • Experience in cyber government, and/or federal law enforcement.
    • Experience with Cyber Kill Chain.  

     

    Options

    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed