This site uses cookies. To find out more, see our Cookies Policy

Cyber Threat Analyst (DDA) in Washington, DC at ManTech

Date Posted: 3/13/2018

Job Snapshot

  • Employee Type:
  • Job Type:
  • Experience:
    Not Specified
  • Date Posted:

Job Description


Clearance Level Needed:



Ready to join ManTech and help our Department of Veterans Affairs customer maintain a strong Cyber Security posture?

The Cyber Security Analyst will join our team in protecting the Department of Veterans Affairs computer systems and networks. The selected candidate must have experience collaborating with IT users and customers to document and strategize on improvements to current business processes (i.e., business process reengineering). This member of our team will be responsible for delivering market research on conditions impacting the operational efficiency of the organization and identifying root causes for process improvement.

The successful candidate must be well-versed in security operations, cyber security tools, and Open Source information gathering from public and private sources. The candidate will provide operational support on expert level analysis in regards to Advanced Persistent Threats (APTs), Indicators of Compromise (IOC), Intelligence Gathering and sharing this information with other formalized partners. Duties and responsibilities may include, but are not limited to:

  • Gather, extract, and disseminate open source intelligence (OSINT) on threat actors targeting the VA, health care industry, government agencies in general, as well as public sector.
  • Work with industry partners to gather and share intelligence. Apply intelligence to the VA network and systems to proactively identify potential cyber threats.
  • Provide proactive event monitoring/event management/configuration of the following security tools for targeted threats and malicious activity including but not limited to: Splunk, Palo Alto Networks, McAfee EPO, Cisco Ironport, Netscout, Sourcefire Defense Center and Bigfix
  • Determine if an event meets the criteria for additional cyber hunt investigation and/or constitutes a security incident subject to investigation
  • Review audit logs and identify any unusual or suspect behavior
  • Provide targeted attack detection and analysis, including the development of custom signatures and log queries and analytics for the identification of targeted attacks
  • Develop and execute custom scripts to identify host-based indicators of compromise
  • Provide advanced technical capabilities to senior leadership, including Big Data Analytics, and Predictive Intelligence
  • Provide proactive APT hunting, incident response support, and advanced analytic capabilities
  • Profile and track APT actors that pose a threat to the organization in coordination with threat intelligence support teams
  • Support the incident response process by providing advanced analysis services when requested to include recommending containment and remediation processes, independent analysis of security events, and reporting of identified incidents to Incident Handling (IH)
  • Provide all VA cyber task areas with actionable intelligence and serve as the threat dissemination hub.
  • Experience in cyber investigations and information gathering techniques, required
  • Experience briefing C-level executives on current threat landscapes with future analytic predictions
  • In depth understanding of NIST SP 800-61, US CERT and Office of Management and Budget (OMB) standards
  • Experience interpreting and implementing cyber security regulations

Job Requirements

Requires Bachelor's degree or equivalent and six to ten years of related experience. Minimum of four years experience in technology/tools specific to the target platforms.