Description & Requirements
ManTech seeks a highly skilled and knowledgeable Cyber Threat Intelligence Lead who is responsible for leading a small team of cyber threat intelligence analysts. This position is located on customer site in Washington, D.C.
Responsibilities include but are not limited to:
Triage information collected from different threat intelligence sources, including internal sources and OSINT, and study the pattern of attacks, their methodology, motive, severity, and threat landscape applicable to client systems.
Enhance the organization’s overall cybersecurity posture by delivering timely, relevant, cyber intelligence information and reports to stakeholders, based on gathering, analyzing, and synthesizing complex attack patterns and trends.
Gather information from private and proprietary sources, including paid subscriptions, information-sharing communities, or partnerships with other organizations. Synthesize threat data from diverse sources and identify complex attack patterns and trends.
Enrich data with context to provide a more comprehensive understanding of threats, such as attributing specific threats to threat actors or groups.
Provide tactical intelligence that helps the SOC understand the specifics of current threats, including indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs) used by attackers. Offer strategic intelligence to help the organization anticipate long term trends, understand the motivations of threat actors and plan for future cybersecurity challenges.
Assist the SOC during ongoing incidents by providing real-time intelligence updates, context, and guidance to help investigate, contain, and remedy threats. Actively participate in information-sharing communities and industry groups and collaborate with other organizations to gain and contribute to a collective understanding of the threat landscape.
Conduct threat hunt activities to proactively identify and mitigate potential threats in the environment.
Minimum Qualifications:
Bachelor’s degree, preferably in IT, Cybersecurity, Engineering, Computer Science, Mathematics, or related discipline.
7+ years of IT experience with a minimum of 5 years’ experience with cyber intelligence analysis
2+ years of experience performing threat hunts.
2+ years of experience using Splunk.
GIAC Cyber Threat Intelligence (GCTI) certification.
Demonstrated experience using MITRE ATT&CK framework for cyber threat intelligence and hunting.
Demonstrated experience using the STRIDE and DREAD threat models for risk assessments and evaluating potential threats.
Experience using open-source/OSINT collection methods and tools to enhance threat intelligence activities.
Preferred Qualifications:
Hands-on experience with Microsoft Sentinel
Experience using threat intelligence sharing platforms and collaborative frameworks, such as Information Sharing and Analysis Centers (ISACs).
Security Clearance Requirements:
Must possess active Top Secret security clearance
Physical Requirements:
- Must be able to remain in a stationary position 50%
- Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer
- The person in this position frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.