Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Cyber Threat Intelligence​/Fusion Analyst - TS​/SCI Polygraph image - Rise Careers
Job details

Cyber Threat Intelligence​/Fusion Analyst - TS​/SCI Polygraph

Position: Cyber Threat Intelligence (Fusion) Analyst - TS/SCI with PolygraphType ofRequisition :Regular Clearance Level Must Currently Possess:Top Secret/SCI Clearance Level Must Be Able to Obtain:Top Secret SCI + Polygraph Public Trust/OtherRequired:None Job Family:Cyber SecurityJob Qualifications:Skills:Cybersecurity, Cybersecurity Risk Assessment, MITRE ATT&CK FrameworkCertifications:None Experience:10 + years of related experienceUS CitizenshipRequired:YesJob Description:How A Cyber Threat Intelligence (Fusion) Analyst Will Make an Impact The successful applicant should be expected to identify potential cyber threats, determine levels of risk, and produce analytical reports for a variety of audiences. You will occasionally be required to present your findings in front of senior executives, so the ability to translate technical indicators into layperson’s terms is vital.Outstanding problem-solving skills are essential. When serious threats are identified, you will work closely with other areas of the security team to identify appropriate solutions. You must be passionate about technology, and able to learn the ropes of new security solutions rapidly. Indicators of Compromise (IOC) s will be obtained through: forensic analysis of digital information, Open-Source Intel (OSINT) review/monitoring, available tools both customer provided and open source, and pivoting/researching on previously reported IOCs.Recommending adjustment of countermeasures, enterprise or tactical, to account for threats. Discovering adversary campaigns, anomalies and inconsistencies in sensor and system logs, SIEMs, and other data; investigate to identify or rule out system compromises, provide written analytic summaries and attack life cycle visualizations. Participate in collaborative sessions with other CNDSPs and IC agencies and cross functional (Current Operations, Future Operations, Logistics, Planning, Resourcing and Requirements) on malicious intrusions, attacks or suspicious activities, as well as share emerging Cyber Threat Intel data to achieve centrally coordinated, threat informed and prioritized vulnerability scoring and mitigation methodology.Analyzing and documenting malicious cyber actors TTPs, providing recommendations and alignment to vulnerabilities and applicability to the enterprise operational environment. Assists in the development of IOCs for active defensive countermeasures and passive detection signatures. Providing risk assessments and recommendations based on analysis of technologies, threats, intelligence, and vulnerabilities. Recommending adjustment of prioritized enterprise focused analysis based on immediate threat identified based on intelligence and other analysis performed.Collecting analysis metrics and trending data, identify key trends, and provide situational awareness on these trends. Good written communications skills are necessary to properly document and report the identification and sharing of newly identified IOCs. Attention to detail and ability to work with team-members and independently. What You’ll Need to Succeed:Bachelor's Degree and 10+ years of relevant experience, equivalent combinations of education, certifications, and experience will be considered.  DoD Approved Baseline 8570 IAT level II (Sec+, CySA+, CND, etc.) certification is required prior to start date.DoD Approved Baseline 8570 CSSP Analyst (CEH, CySA+, CND, Cloud+, etc.) certification is required prior to start date.GIAC Cyber Threat Intelligence (GCTI) or equivalent (other GIAC certs or any cert under 8570 CSSP Analyst) certification is required within first 120 days of employment.Security Clearance Level: TS/SCI clearance and ability to obtain and maintain a CI Polygraph RequiredSkills and Abilities:Must have knowledge of standard network infrastructure. Knowledge of masquerading, certificates, and file hashing. Familiar with monitoring emerging threats through Tools, Techniques, and Procedures (TTPs) and how they relate to the MITRE ATT&CK framework Ability to pivot on indicatorsLocation:On Customer Site Reston, VA Bolling, AFB (DC) The likely salary range for this position is $154,960 - $195,500. This is not, however, a guarantee of compensation or salary.…
General Dynamics Information Technology Glassdoor Company Review
3.9 Glassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon Glassdoor star icon
General Dynamics Information Technology DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of General Dynamics Information Technology
General Dynamics Information Technology CEO photo
Amy Gilliland
Approve of CEO

Average salary estimate

$175230 / YEARLY (est.)
min
max
$154960K
$195500K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Cyber Threat Intelligence​/Fusion Analyst - TS​/SCI Polygraph, General Dynamics Information Technology

Are you ready to take on a key role as a Cyber Threat Intelligence (Fusion) Analyst at an innovative company in Reston, VA? In this exciting position, you'll leverage your extensive experience to identify potential cyber threats and determine the risks involved. You'll create insightful analytical reports for diverse audiences, and your ability to present complex data in understandable terms will be crucial, especially when addressing senior executives. We're looking for someone with a passion for technology and a knack for problem-solving who is eager to learn new security solutions rapidly. You will utilize various resources, including forensic analyses and Open-Source Intelligence (OSINT) monitoring, to gather Indicators of Compromise (IOCs). Coupled with your team, you'll work on mitigating detected threats and anomalies, analyzing malicious cyber actor techniques, and enhancing our security posture. If you have over 10 years of relevant experience and the necessary qualifications, including a TS/SCI clearance and certifications like Security+, and are excited about making a significant impact, then this position is perfect for you. Your attention to detail, ability to work both independently and collaboratively, and robust communication skills will help you shine in this role and contribute effectively to the security objectives of our organization.

Frequently Asked Questions (FAQs) for Cyber Threat Intelligence​/Fusion Analyst - TS​/SCI Polygraph Role at General Dynamics Information Technology
What are the main responsibilities of a Cyber Threat Intelligence Analyst at this company?

As a Cyber Threat Intelligence Analyst at our company, you will primarily be responsible for identifying potential cyber threats, analyzing risk levels, and producing analytical reports tailored for various audiences. Collaboration with other security team members is essential when serious threats are detected, enabling you to recommend appropriate countermeasures.

Join Rise to see the full answer
What qualifications do you need to apply for the Cyber Threat Intelligence Analyst position?

Candidates applying for the Cyber Threat Intelligence Analyst position must possess a Bachelor's degree and have at least 10 years of relevant experience. Additionally, you must have a TS/SCI clearance and specific certifications, such as Security+ or equivalent, as well as the ability to obtain a CI Polygraph.

Join Rise to see the full answer
How important is cybersecurity experience for the Cyber Threat Intelligence Analyst role?

Cybersecurity experience is crucial for success in the Cyber Threat Intelligence Analyst role. With over a decade of relevant experience required, you will need to demonstrate solid knowledge of cybersecurity principles, the MITRE ATT&CK framework, and the analysis of threats to make impactful recommendations.

Join Rise to see the full answer
What kind of projects will a Cyber Threat Intelligence Analyst work on?

In this role, a Cyber Threat Intelligence Analyst will work on projects involving the identification and mitigation of cyber threats. You will analyze security incidents, develop Indicators of Compromise (IOCs), and contribute to collaborative sessions addressing emerging threats and vulnerabilities.

Join Rise to see the full answer
What skills are necessary for success as a Cyber Threat Intelligence Analyst in Reston, VA?

To excel as a Cyber Threat Intelligence Analyst at our company, you need excellent problem-solving skills, the ability to communicate complex technical information effectively, and a strong understanding of network infrastructure and emerging cyber threats. Attention to detail and teamwork are also vital.

Join Rise to see the full answer
Common Interview Questions for Cyber Threat Intelligence​/Fusion Analyst - TS​/SCI Polygraph
Can you explain your experience with threat intelligence and how it applies to this role?

In your response, detail the types of threat intelligence tools you've worked with and how your experience aligns with the responsibilities outlined for the Cyber Threat Intelligence Analyst position. Highlight specific projects where you successfully identified threats and your role in resolving them.

Join Rise to see the full answer
What frameworks and methodologies do you utilize for threat analysis?

Discuss your familiarity with frameworks like MITRE ATT&CK and any methodologies you’ve used in previous roles. Providing examples of how these frameworks helped guide threat assessments will strengthen your response.

Join Rise to see the full answer
How do you keep up with emerging cybersecurity threats?

Share your strategies for staying current in the field, including sources you trust for updates, such as cybersecurity blogs, threat intelligence platforms, or professional networks. This shows your dedication to continuous learning and proactive threat management.

Join Rise to see the full answer
Describe a challenging cyber threat you encountered and how you addressed it.

Provide a specific, detailed example of a cyber threat you faced, the steps you took to investigate and resolve the situation, and the outcome. This demonstrates your analytical skills and ability to handle real-world challenges.

Join Rise to see the full answer
What role does collaboration play in threat intelligence operations?

Emphasize the importance of working with cross-functional teams in your response. Discuss experiences where collaboration led to improved threat detection or responses, showcasing your ability to work well in a team environment.

Join Rise to see the full answer
How do you approach risk assessment within cybersecurity?

Discuss your methodology for conducting risk assessments and how you prioritize risks based on their potential impact and likelihood. Providing examples of past assessments will illustrate your expertise and judgment.

Join Rise to see the full answer
What tools do you prefer for monitoring cyber threats and why?

Mention specific tools or applications that you have experience with and why they are effective for monitoring threats. Discuss any features you find particularly useful and how they have aided your previous work.

Join Rise to see the full answer
Can you explain how you document and report threat intelligence findings?

Clarify your process for documenting findings, including which formats you prefer and how you ensure that reports are accessible to different audiences. This shows your communication skills and attention to detail.

Join Rise to see the full answer
What strategies do you use to translate complex technical information for non-technical stakeholders?

Provide concrete examples of how you've simplified complex cybersecurity concepts for non-technical audiences, emphasizing your communication skills and your understanding of the importance of clarity in reporting.

Join Rise to see the full answer
What certifications do you hold, and how do they support your effectiveness in this position?

List relevant certifications, like Security+ or GIAC Cyber Threat Intelligence, and explain how these qualifications enhance your capabilities. Discuss any practical applications or knowledge gained that directly contributes to your role.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Posted 8 days ago
Photo of the Rise User
Posted 11 days ago
Posted 14 days ago
Photo of the Rise User
Posted 3 days ago
Photo of the Rise User
Inclusive & Diverse
Mission Driven
Social Impact Driven
Passion for Exploration
Dare to be Different
Diversity of Opinions
Reward & Recognition
Empathetic
Feedback Forward
Work/Life Harmony
Collaboration over Competition
Growth & Learning
Transparent & Candid
Customer-Centric
Rise from Within
Friends Outside of Work
Medical Insurance
Dental Insurance
Vision Insurance
Mental Health Resources
Life insurance
Disability Insurance
Health Savings Account (HSA)
Flexible Spending Account (FSA)
Learning & Development
Work Visa Sponsorship
Employee Resource Groups
401K Matching
Paid Time-Off
Maternity Leave
Social Gatherings
Company Retreats

At GDIT, we deliver the resources, solutions, and experience at the most critical moments of change. 50 years of experience. 30,000 everyday heroes.

225 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
December 3, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!