Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Cyber Threat Intelligence Analyst image - Rise Careers
Job details

Cyber Threat Intelligence Analyst

DescriptionLeidos is seeking a talented Cyber Threat Intelligence Analyst to join our team to support a federal customer within the customers Security Operations. The Cyber Threat Intel Analyst will need a strong cyber security background with experience with the following:• Identify, track and investigate high priority threat campaigns, malicious actors with the interest, capability and TTPs (Techniques, Tactics and Procedures).• A comprehensive understanding, analyzing and tracking the cyber threat landscape, including identifying and analyzing cyber threats actors, APT TTPs and/or activities to enhance cyber security posture of the organization’s IT operating environment.Clearance Required: Must have active/current Top Secret clearance with SCI eligibility.Basic Qualifications:• Candidates shall have a bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, with 4-8 years of professional experience and at least 3 years in incident detection and response and/or cyber intelligence analysis. Additional experience or certs may be considered for additional years of experience in lieu of a degree.• Maintain and drive the development of new reports of Cyber Threat Intelligence analysis to peers, management, and customer teams for purposes of situational awareness and making threat intelligence actionable.• Provide support to security operations during incident response and threat hunting activities that includes cyber threat analysis support, research, recommending relevant remediation and mitigation.• Conduct trending and correlation of various cyber intelligence sources for the purposes of indicator collection, shifts in TTPs, attribution and establishing countermeasures to increase cyber resiliency.• Deep understanding of Cyber Kill Chain and applicable analytic models such the Diamond Model.• Strong written and oral communication skills.Certifications/Skills:• Must have ONE of the following: GCED, GCIA, GCFA, GPEN, GWAPT, GCFE, GREM, GXPN, GMON, GCIH, CCFP, CCSP, CISSP, CSIH, CHFI, LPT, ECSA, OSCP, OSCE, OSWP, OSEE, EnCE• Previous DOD, IC or Law Enforcement Intelligence or Counter Intelligence Training/Experience.• Knowledge of Structured Analytic Techniques• Host-based and network-based forensics related to the identification of advanced cyber threat activities, intrusion detection, incident response, malware analysis, and security content development (e.g., signatures, rules etc.); and cyber threat intelligence.• Proficiency in one more of the following computer languages Python, Bash, Visual Basic or Powershell in order to support cyber threat detection or reporting.• Ability to develop scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML or other type most appropriate for the task.Original Posting Date:2024-11-12While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.Pay Range:Pay Range $81,250.00 - $146,875.00The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Leidos Glassdoor Company Review
3.8 Glassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon Glassdoor star icon
Leidos DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of Leidos
Leidos CEO photo
Tom Bell
Approve of CEO

Average salary estimate

$114062.5 / YEARLY (est.)
min
max
$81250K
$146875K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Cyber Threat Intelligence Analyst, Leidos

Leidos is on the lookout for a Cyber Threat Intelligence Analyst to join our dynamic team in Virginia, supporting a federal customer's Security Operations. As a Cyber Threat Intelligence Analyst at Leidos, you'll dive into the depths of cybersecurity, applying your expertise to identify and analyze high-priority threat campaigns and malicious actors. Your work will center on tracking advanced persistent threats (APTs), their techniques, tactics, and procedures (TTPs), and advocating for enhancements to our client's cybersecurity posture. Collaborating closely with fellow analysts and management, you’ll create actionable reports that drive informed decisions and situational awareness. You'll also provide invaluable support during incident responses, conducting research and recommending effective mitigation strategies. A firm grasp of the Cyber Kill Chain and analytic models like the Diamond Model will be essential in your role. Additionally, the ideal candidate will possess proficiency in scripting languages such as Python or PowerShell, allowing for optimized cyber threat detection and reporting. With a bachelor's degree in a relevant field and extensive professional experience, you must hold an active Top Secret clearance to qualify for this challenging yet rewarding opportunity. If you're passionate about cybersecurity and ready to make a difference with Leidos, we’d love to hear from you!

Frequently Asked Questions (FAQs) for Cyber Threat Intelligence Analyst Role at Leidos
What are the primary responsibilities of a Cyber Threat Intelligence Analyst at Leidos?

As a Cyber Threat Intelligence Analyst at Leidos, primary responsibilities include identifying and investigating high-priority threat campaigns and providing in-depth analysis of the cyber threat landscape. This role encompasses tracking malicious actors' TTPs, generating actionable threat intelligence reports, and supporting security operations during incident response. Analysts will also analyze various cyber intelligence sources to establish effective countermeasures for enhancing cyber resilience.

Join Rise to see the full answer
What qualifications are required for the Cyber Threat Intelligence Analyst position at Leidos?

Candidates for the Cyber Threat Intelligence Analyst position at Leidos must possess a bachelor’s degree in Computer Science, Cybersecurity, or a related field, along with 4-8 years of professional experience, including at least 3 years in incident detection and response or cyber intelligence analysis. Additionally, holding an active Top Secret clearance is essential. Certifications such as GCED, GCIA, or CISSP are also required.

Join Rise to see the full answer
What certifications should a Cyber Threat Intelligence Analyst at Leidos have?

For the Cyber Threat Intelligence Analyst role at Leidos, candidates should hold at least one relevant certification such as GCED, GCIA, GCFA, GPEN, or CISSP. These certifications demonstrate a solid foundation in cybersecurity principles and practices, essential for effectively fulfilling the responsibilities of the role and advancing the organization's security posture.

Join Rise to see the full answer
What skills are important for a successful Cyber Threat Intelligence Analyst at Leidos?

A successful Cyber Threat Intelligence Analyst at Leidos should have strong analytical skills, an in-depth knowledge of the Cyber Kill Chain and analytic models, and proficiency in scripting languages like Python or PowerShell. Additionally, excellent written and verbal communication skills are crucial for reporting findings and collaborating with teams. Knowledge of structured analytic techniques and host-based/network-based forensics is also beneficial.

Join Rise to see the full answer
How does the Cyber Threat Intelligence Analyst contribute to security operations at Leidos?

The Cyber Threat Intelligence Analyst at Leidos contributes significantly to security operations by supporting incident responses through thorough threat analysis and research. This includes identifying threats, recommending mitigation strategies, and providing actionable intelligence reports to enhance overall cybersecurity. Their work helps organizations respond dynamically to emerging threats and strengthens the security infrastructure.

Join Rise to see the full answer
Common Interview Questions for Cyber Threat Intelligence Analyst
Can you explain the Cyber Kill Chain and its importance in cyber threat analysis?

The Cyber Kill Chain is a model used to describe the stages of a cyber attack, from initial reconnaissance to execution. Understanding this model is crucial for a Cyber Threat Intelligence Analyst as it provides a framework for analyzing attack patterns and developing counter-strategies. When answering, focus on how this model can help identify vulnerabilities and improve incident detection.

Join Rise to see the full answer
Describe your experience with incident detection and response.

In your response, highlight specific instances where you've identified security incidents, the tools you employed, and the outcomes of your interventions. It's important to showcase your understanding of the entire incident response lifecycle and the analytical techniques used to mitigate threats effectively.

Join Rise to see the full answer
How do you gather and analyze threat intelligence?

Discuss various resources and tools you've used to collect threat intelligence, such as threat feeds, open-source intelligence, and internal data. It’s beneficial to convey how you assess the credibility and relevance of the information before analyzing it to inform security posture and incident response activities.

Join Rise to see the full answer
What approach do you take when collaborating with team members during incident investigations?

Highlight your teamwork philosophy, emphasizing open communication and leveraging each team member's strengths. Mention specific tools or practices you've implemented to enhance collaboration, such as regular debriefings, shared documentation platforms, or joint analysis sessions.

Join Rise to see the full answer
Can you give an example of a high-priority threat you have analyzed and the outcome?

When answering, provide a detailed case study of a threat you encountered. Discuss the TTPs involved, your analytic approach, the challenges faced, and the preventative measures implemented following your analysis. This will demonstrate your analytical skills and practical experience.

Join Rise to see the full answer
What advanced persistent threat (APT) models are you familiar with, and how do you apply them?

Discuss specific APT models you've worked with and how they help in analyzing sophisticated attack methods. Explain how you've utilized these models in past analyses to help pinpoint adversary behaviors and enhance threat intelligence reporting.

Join Rise to see the full answer
Explain your scripting experience and how you've used it in threat detection.

Detail your proficiency in scripting languages relevant to cybersecurity, such as Python or PowerShell. Provide examples of scripts you've written for automating tasks related to threat detection or incident response, showcasing impact and efficiency improvements.

Join Rise to see the full answer
What structured analytic techniques do you use in threat assessments?

Discuss specific techniques you’ve applied, such as SWOT analysis or alternative futures analysis. Explain how these techniques enable you to create more accurate threat assessments and inform decisions based on a robust analysis of different scenarios.

Join Rise to see the full answer
How do you stay updated on the latest cybersecurity threats and trends?

Mention specific resources you rely on, such as industry journals, threat intelligence reports, and security forums. Highlight how your approach to continuous learning helps you maintain a proactive stance in identifying and mitigating new threats.

Join Rise to see the full answer
What is your process for developing actionable reports from threat intelligence?

Explain your methodology for transforming complex analytical data into clear, actionable intelligence for stakeholders. Discuss how you ensure reports are tailored to different audiences and how you measure the effectiveness of the actions derived from your reports.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Posted 14 days ago
Photo of the Rise User
Ramboll Remote Unit No. B802, 8th Floor, Tower B, Commerzone IT Park, Door No. 111, Mount Poonamallee Road, Porur Chennai- 600116 India, Chennai, India, Chennai, India
Posted 3 days ago
Photo of the Rise User
Posted 5 days ago
Photo of the Rise User
Gcore Remote Poland, Serbia, Luxembourg, Germany
Posted 11 days ago
Photo of the Rise User
Posted 4 days ago
Inclusive & Diverse
Collaboration over Competition
Growth & Learning
Mission Driven
Transparent & Candid
Photo of the Rise User
Nuovo Photography Hybrid No location specified
Posted 13 days ago
Posted 4 days ago

Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. Our Mission, Vision, and Values guide the way we do business. At Leidos, our mission is to make the world safer, healthier, and mor...

374 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
December 10, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!