KBR
Cyber Threat Intel Analyst
KBR, Lincoln, Massachusetts, us, 01773
Title:
Cyber Threat Intel Analyst
Belong, Connect, Grow, with KBR!
Program Summary
KBR is seeking a highly motivated self-starter, adaptable to a fast-paced and challenging environment as a cyber threat intelligence analyst in the Air Force Life Cycle Management Center (AFLCMC) who can work independently and as a team contributor supporting multiple stakeholders. Join our small but dynamic and impactful team of talented and forward leaning analysts in supporting cybersecurity operations to meet US Air Force requirements here at Hanscom AFB, MA.
Job Summary
You will help distinguish our company with professionalism, best practices and deliverables that build customer loyalty. You will be part of a team of analysts supporting Air Force programs in acquisition and sustainment to assess and improve cybersecurity for Air Force systems and applications migrating to the cloud, being developed in DevSecOps/Agile environments, or addressing requirements for enterprise IT modernization.
Roles and Responsibilities
Support cybersecurity of Air Force Information Technology (IT), Command and Control (C2), and Weapon Systems (WS)
Provide cyber threat intelligence to DoD weapon systems and IT systems
Conduct all source research on vulnerabilities of assigned programs
Execute system decomposition given systems engineering artifacts
Conduct analysis of adversary cyber tactics, techniques, and procedures (TTPs) on system-level attack surfaces
Aggregate, analyze and evaluate program data sources to evaluate risk
Produce all source analytic products
Produce and review finished intelligence reports on supply chain vulnerabilities and Adversarial Cyber Threat Assessments
Provide written and oral presentations
Remain current on adversarial TTPs and applicability to programs assigned
Remain knowledgeable on Advanced Persistent Threat (APT) attacks
U.S. Citizenship is required.
Basic Qualifications
Knowledge and experience with Air Force Information Technology (IT), Command and Control (C2), and Weapon Systems (WS)
Knowledge and experience with threat assessment processes and analytical products in support of DoD
BS/BA and/or MA in technical area and 5-10 years’ directly related experience required. Experience may be a mix of cyber threat analyst and other software/network-related technical experience.
Active DoD Top Secret Clearance with SCI Eligibility is required at hire and must be maintained.
Preferred Qualifications
Knowledge and experience with Cloud and DevSecOps/Agile environments
Understanding and familiarity with MITRE ATT&CK Framework
Understanding and familiarity of Institute of Standards and Technology Risk Management Framework
Advanced IT certification and Joint Cyber Analysis Course (JCAC) graduate
Command, Control, Communications, Computers (C4) Intelligence, Surveillance and Reconnaissance (ISR) experience
At KBR
At KBR, we are passionate about our people, sustainability, and our Zero Harm culture. These inform all that we do and are at the heart of our commitment to, and ongoing journey toward being a more inclusive and diverse company. That commitment is central to our team of teams philosophy and fosters an environment of real collaboration across cultures and locations. Our individual perspectives bring enhanced value to our teams and help us develop solutions for the most challenging problems. We understand that by embracing those and working together, we are more innovative, more resilient, and safer.
KBR is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran status, genetic information, union status and/or beliefs, or any other characteristic protected by federal, state, or local law.
#J-18808-Ljbffr
Cyber Threat Intel Analyst
Belong, Connect, Grow, with KBR!
Program Summary
KBR is seeking a highly motivated self-starter, adaptable to a fast-paced and challenging environment as a cyber threat intelligence analyst in the Air Force Life Cycle Management Center (AFLCMC) who can work independently and as a team contributor supporting multiple stakeholders. Join our small but dynamic and impactful team of talented and forward leaning analysts in supporting cybersecurity operations to meet US Air Force requirements here at Hanscom AFB, MA.
Job Summary
You will help distinguish our company with professionalism, best practices and deliverables that build customer loyalty. You will be part of a team of analysts supporting Air Force programs in acquisition and sustainment to assess and improve cybersecurity for Air Force systems and applications migrating to the cloud, being developed in DevSecOps/Agile environments, or addressing requirements for enterprise IT modernization.
Roles and Responsibilities
Support cybersecurity of Air Force Information Technology (IT), Command and Control (C2), and Weapon Systems (WS)
Provide cyber threat intelligence to DoD weapon systems and IT systems
Conduct all source research on vulnerabilities of assigned programs
Execute system decomposition given systems engineering artifacts
Conduct analysis of adversary cyber tactics, techniques, and procedures (TTPs) on system-level attack surfaces
Aggregate, analyze and evaluate program data sources to evaluate risk
Produce all source analytic products
Produce and review finished intelligence reports on supply chain vulnerabilities and Adversarial Cyber Threat Assessments
Provide written and oral presentations
Remain current on adversarial TTPs and applicability to programs assigned
Remain knowledgeable on Advanced Persistent Threat (APT) attacks
U.S. Citizenship is required.
Basic Qualifications
Knowledge and experience with Air Force Information Technology (IT), Command and Control (C2), and Weapon Systems (WS)
Knowledge and experience with threat assessment processes and analytical products in support of DoD
BS/BA and/or MA in technical area and 5-10 years’ directly related experience required. Experience may be a mix of cyber threat analyst and other software/network-related technical experience.
Active DoD Top Secret Clearance with SCI Eligibility is required at hire and must be maintained.
Preferred Qualifications
Knowledge and experience with Cloud and DevSecOps/Agile environments
Understanding and familiarity with MITRE ATT&CK Framework
Understanding and familiarity of Institute of Standards and Technology Risk Management Framework
Advanced IT certification and Joint Cyber Analysis Course (JCAC) graduate
Command, Control, Communications, Computers (C4) Intelligence, Surveillance and Reconnaissance (ISR) experience
At KBR
At KBR, we are passionate about our people, sustainability, and our Zero Harm culture. These inform all that we do and are at the heart of our commitment to, and ongoing journey toward being a more inclusive and diverse company. That commitment is central to our team of teams philosophy and fosters an environment of real collaboration across cultures and locations. Our individual perspectives bring enhanced value to our teams and help us develop solutions for the most challenging problems. We understand that by embracing those and working together, we are more innovative, more resilient, and safer.
KBR is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran status, genetic information, union status and/or beliefs, or any other characteristic protected by federal, state, or local law.
#J-18808-Ljbffr