All-Source Intelligence Analyst IV – Killchain Analyst
Responsibilities
- Provides vulnerability and kill chain analysis of SCO designated systems.
- Researches systems to determine vulnerabilities in order to better enable DoD user freedom of operation within the applicable mission or operational domain.
- Responsibilities include continuous monitoring and analysis, threat hunting, security compliance, security event auditing and analysis, rule development and tuning, forensics, and incident response.
- Support all phases of the incident response life cycle: 1) Preparation, 2) Detection and Analysis, 3) Containment, Eradication and Recovery, and 4) Post-Event Activity.
- Exercise forensic capabilities (disk, memory, and network) to uncover intrusion vectors and discover scope of security incidents and events.
- Identify opportunities for improvement and automation and lead efforts to operationalize team ideas.
- Identify and offer solutions to gaps in current capabilities, visibility, and security posture.
- Correlate information from disparate sources to develop novel detection methods.
- Provides expertise in MITRE ATT&CK and Cyber Kill Chain.
- Bachelors Degree and 8+ years of related experience or Masters degree and 6+ years of experience or PhD and 3+ years of experience.
- Active Top Secret clearance.
- Experience with F2T2EA targeting.
- Experience writing intelligence reports.
- Knowledge of Boolean logic.
- Masters degree in Russian or Chinese Studies.
To apply for this job please visit careers-peraton.icims.com.