This site uses cookies. To find out more, see our Cookies Policy

Advance Cyber Threat Analyst II in Washington, DC at ManTech

Date Posted: 4/3/2018

Job Snapshot

  • Employee Type:
    Full-Time
  • Job Type:
    Other
  • Experience:
    Not Specified
  • Date Posted:
    4/3/2018

Job Description

Group:


MSS

Clearance Level Needed:


None

Shift:


Day

Category:


Cyber




Are you ready to join ManTech and help our Department of Veterans Affairs customer maintain a strong Cyber Security posture?

As an Insider Threat Case Support Analyst you can join the front-line and assist one of our Nation's most essential agencies fulfill its mission to protect and serve our Veteran population.
The selected candidate will be a member of the Security Analysis Team, and will work during the core hours Monday - Friday on this newly awarded contract. The candidate will perform cyber threat and intelligence analysis, and develop briefings and reports to aid in information sharing and protection efforts. This individual will develop and maintain subject matter expertise of Advanced Persistent Threats and assists with Incident Response efforts. The Insider Threat Case Support Analyst will possess knowledge of, and experience in, the following:

  • The Cyber Insider Threat Analyst will beresponsible for providing security and incident analysis and identifyinganomalous insider activities. The position is located on-site at the customer's facility.
  • The successful candidate must be well-versed insecurity operations, cyber security tools, intrusion detection, and securednetworks. The candidate will is assist in drafting, maintaining, and monitoringorganizational wide information security policies, procedures, controltechniques, training and inspection requirements centered around insider threat management.
Mandatory Skills Requirements:


• Monitoring user activity on an organizations ITautomated systems, infrastructure, and networks for any suspicious insideractivity


• Reporting anomalous insider activities toGovernment staff within 15 minutes of identification


• Evaluating historical events and incidents toidentify trends and methods of data loss


• Coordinating response activities with variousstakeholders for confirmed incidents and recommending mitigation strategies


• Continuously evaluating changes in actors,tactics, techniques and targets to enhance threat scenarios and use cases andmake recommendations to ensure that the technology strategy maintains pace withthe changing insider threat landscape


• Assisting with planning and execution of insiderthreat training


• Proactively gathering and compilinginternal/external intelligence data
Generating weekly and monthly trend analysisreports for insider threat cases and activities






Job Requirements

Bachelor's degree in Information Technology or Business OR Associates degree & 2 years relevant experience with professional certification, such as CISSP or GREM or GCIH







Minimum of six (6) years Information Technology experience; minimum four (4) years advanced Cyber Threat Information experience







4 years relevant experience with professional certification, such as CISSP or GREM or GCIH can be substituted for education