Top Secret Clearance Jobs
Threat Intelligence Analyst
Top Secret Clearance Jobs, Arlington, Virginia, United States, 22201
About the job Threat Intelligence AnalystTop Secret Clearance Jobs
is dedicated to helping those with the most exclusive security clearance find their next career opportunity and get interviews within 48 hours.
Position:
Intelligence Operations
Location:
Arlington, VA - Hybrid 3 days per week
Compensation:
150K plus 15% bonus and full benefits (100% paid by employer)
Position Summary:
The job of a Cyber/All Source Intelligence Analyst is to work with the Intel Team to evaluate and warn about cyber and other threats and vulnerabilities to critical assets in the financial services sector. As a part of this job, the analyst will collaborate with U.S. Government partners to drive and inform a robust intelligence cycle on threats and vulnerabilities. The analyst will also develop new sources of information on cyber and other threat issues relevant to the sector and deliver threat research on the other non-cyber challenges facing the sector. The analyst will contribute to and produce a range of strategic and tactical warning products and participate in briefings to members and government partners. Overall, the job requires strong analytical and technical skills to identify, analyze and communicate potential threats to the client's assets.
Responsibilities
Provide strategic and tactical warning on cyber and other threats and vulnerabilities relevant to internal stakeholders and to the systemically relevant critical infrastructure identified in the firm's Risk Register.Maintain and develop strong relationships with the firm members' intelligence teams and US Government partners to enable effective and timely collaboration on cyber and non-cyber threats to the sector and emerging vulnerabilities.Work with firm members and government partners to develop a unified data acquisition, analysis, and early warning capability on critical cyber and non-cyber threats and vulnerabilities.In terms of cyber threats, engage in technical discussions with government and private sector cyber experts using the MITRE ATT&CK Framework, Cyber Kill Chain, Diamond Model of Intrusion Analysis, and other relevant cyber network defense and intelligence frameworks.Convey the results of the technical discussions in written products and briefings in forms that are relevant to firm member intelligence teams and senior leaders in member clients.Skills and Experience Needed:
Strong collaborative skills and proven ability to work in a diverse team of security professionals.Strong analytical, verbal, and written skills with a demonstrated track record of delivering all-source intelligence products in a manner consistent with Intelligence Community standards.Self-starter who thrives in a fast-paced, ambiguous environment, adept at anticipating client needs, effectively multitasking, and managing priorities.Ability to work independently as well as collaborate as part of a team.Excellent judgement and problem-solving skills, showing the utmost discretion in the management of confidential corporate information.Knowledge of the principal organizations, methods, procedures, and techniques of gathering and disseminating intelligence reporting and producing and sharing intelligence analysis.
Required Qualifications:
Bachelor's degree or higher in Engineering, Intelligence Studies, Cyber Security, Computer Science, International Affairs, or related field or relevant work experience.A current TS-SCI background investigation.Desired qualifications:
Experience collecting, analyzing, and interpreting data from multiple sources.5+ years of experience conducting all-source analysis in the Intelligence Community.Experience with threat intelligence tools and management platforms.Knowledge of the MITRE ATT&CK Framework, Cyber Kill Chain, Diamond Model of Intrusion Analysis, and/or other relevant network defense and intelligence frameworks
is dedicated to helping those with the most exclusive security clearance find their next career opportunity and get interviews within 48 hours.
Position:
Intelligence Operations
Location:
Arlington, VA - Hybrid 3 days per week
Compensation:
150K plus 15% bonus and full benefits (100% paid by employer)
Position Summary:
The job of a Cyber/All Source Intelligence Analyst is to work with the Intel Team to evaluate and warn about cyber and other threats and vulnerabilities to critical assets in the financial services sector. As a part of this job, the analyst will collaborate with U.S. Government partners to drive and inform a robust intelligence cycle on threats and vulnerabilities. The analyst will also develop new sources of information on cyber and other threat issues relevant to the sector and deliver threat research on the other non-cyber challenges facing the sector. The analyst will contribute to and produce a range of strategic and tactical warning products and participate in briefings to members and government partners. Overall, the job requires strong analytical and technical skills to identify, analyze and communicate potential threats to the client's assets.
Responsibilities
Provide strategic and tactical warning on cyber and other threats and vulnerabilities relevant to internal stakeholders and to the systemically relevant critical infrastructure identified in the firm's Risk Register.Maintain and develop strong relationships with the firm members' intelligence teams and US Government partners to enable effective and timely collaboration on cyber and non-cyber threats to the sector and emerging vulnerabilities.Work with firm members and government partners to develop a unified data acquisition, analysis, and early warning capability on critical cyber and non-cyber threats and vulnerabilities.In terms of cyber threats, engage in technical discussions with government and private sector cyber experts using the MITRE ATT&CK Framework, Cyber Kill Chain, Diamond Model of Intrusion Analysis, and other relevant cyber network defense and intelligence frameworks.Convey the results of the technical discussions in written products and briefings in forms that are relevant to firm member intelligence teams and senior leaders in member clients.Skills and Experience Needed:
Strong collaborative skills and proven ability to work in a diverse team of security professionals.Strong analytical, verbal, and written skills with a demonstrated track record of delivering all-source intelligence products in a manner consistent with Intelligence Community standards.Self-starter who thrives in a fast-paced, ambiguous environment, adept at anticipating client needs, effectively multitasking, and managing priorities.Ability to work independently as well as collaborate as part of a team.Excellent judgement and problem-solving skills, showing the utmost discretion in the management of confidential corporate information.Knowledge of the principal organizations, methods, procedures, and techniques of gathering and disseminating intelligence reporting and producing and sharing intelligence analysis.
Required Qualifications:
Bachelor's degree or higher in Engineering, Intelligence Studies, Cyber Security, Computer Science, International Affairs, or related field or relevant work experience.A current TS-SCI background investigation.Desired qualifications:
Experience collecting, analyzing, and interpreting data from multiple sources.5+ years of experience conducting all-source analysis in the Intelligence Community.Experience with threat intelligence tools and management platforms.Knowledge of the MITRE ATT&CK Framework, Cyber Kill Chain, Diamond Model of Intrusion Analysis, and/or other relevant network defense and intelligence frameworks