Threat Analyst SME with Security Clearance

3 weeks ago


Fort Meade, United States Markesman Group Full time

Title Threat Analyst SME Location Fort Meade Description Markesman Group is looking for a Threat Analyst SME to join our team in San Antonio, Texas. The Threat Analyst SME develops cyber indicators to maintain awareness of the status of the highly dynamic operating environment. They collect, processes, analyze, and disseminate cyber threat/warning assessments. Responsibilities: * Demonstrated abilities, knowledge, and skills as defined by AN-TWA-001 within the National Initiative for Cybersecurity Education (NICE) Cybersecurity Framework: * Knowledge of computer networking concepts and protocols, and network security methodologies. * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). * Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. * Knowledge of cybersecurity and privacy principles. * Knowledge of cyber threats and vulnerabilities. * Knowledge of specific operational impacts of cybersecurity lapses. * Knowledge of human-computer interaction principles. * Knowledge of network traffic analysis methods. * Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless). * Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). * Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). * Knowledge of website types, administration, functions, and content management system (CMS). * Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). * Knowledge of classification and control markings standards, policies and procedures. * Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). * Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). * Knowledge of current computer-based intrusion sets. * Knowledge of cyber intelligence/information collection capabilities and repositories. * Knowledge of cyber operations terminology/lexicon. * Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). * Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). * Knowledge of evolving/emerging communications technologies. * Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects. * Knowledge of general Supervisory control and data acquisition (SCADA) system components. * Knowledge of host-based security products and how those products affect exploitation and reduce vulnerability. * Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP). * Knowledge of how modern digital and telephony networks impact cyber operations. * Knowledge of how modern wireless communications systems impact cyber operations. * Knowledge of how to extract, analyze, and use metadata. * Knowledge of intelligence disciplines. * Knowledge of intelligence preparation of the environment and similar processes. * Knowledge of intelligence support to planning, execution, and assessment. * Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions. * Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). * Knowledge of malware. * Knowledge of operations security. * Knowledge of organizational hierarchy and cyber decision-making processes. * Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. * Knowledge of telecommunications fundamentals. * Knowledge of the basic structure, architecture, and design of modern communication networks. * Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). * Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. * Knowledge of the ways in which targets or threats use the Internet. * Knowledge of threat and/or target systems. * Knowledge of virtualization products (VMware, Virtual PC). * Knowledge of what constitutes a 'threat' to a network. * Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems.Qualifications: * Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. * Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. * Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes. * Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. * Ability to effectively collaborate via virtual teams. * Ability to evaluate information for reliability, validity, and relevance. * Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products. * Ability to focus research efforts to meet the customer's decision-making needs. * Ability to function effectively in a dynamic, fast-paced environment. * Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts-both internal and external to the organization-to leverage analytical and technical expertise. * Ability to identify intelligence gaps. * Ability to recognize and mitigate cognitive biases which may affect analysis. * Ability to recognize and mitigate deception in reporting and analysis. * Ability to think critically. * Ability to think like threat actors. * Ability to utilize multiple intelligence sources across all intelligence disciplines. * Must possess a TS/SCI clearance. About the Organization About Markesman Group Markesman Group has gathered the nation's foremost experts in Cyber, ISR, Enterprise IT and Intelligence Analysis. We seek to lead with cutting edge technology, high quality development and best value services for both the government and commercial sectors. Our team combines passion, acumen, focus, patriotism, desire, dedication and the love for the job to create value for our customers. We pride ourselves in a rigorous selection process because not only do we want the best, we want the best to want us. Working closely together as part of a service-disabled veteran owned small business, we enjoy a family environment where teammates challenge and elevate each other every day. The Markesman family is always striving to solve tomorrow's problems, today. EOE Statement We are an Equal Opportunity/Affirmative Action Employer. We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state, or local law. This position is currently accepting applications.


  • Threat Analyst

    3 weeks ago


    Fort Meade, United States Independent Software Full time

    Job DescriptionJob DescriptionWhat you will be doing!Independent Software is hiring Threat Analysts, Level 3.   Candidate will research adversarial threats posed to various systems, technologies, operations, or missions in all appropriate intelligence sources, analyze likelihood of threat, and contribute to profiling adversarial behavior, intent, and...

  • Threat Analyst

    3 weeks ago


    Fort Meade, United States Independent Software Full time

    Job DescriptionJob DescriptionWhat you will be doing!As a Threat Analyst, you will use multiple systems and information collected from a variety of sources to assess potential mission, personnel, or facility risks. You’ll work in a fast-paced environment with a high number of assessment requests and will serve as the initial focal point for the...


  • Fort Meade, United States Huntington Ingalls Industries Full time

    Requisition Number: 14969 Required Travel: 0 - 10% Employment Type: Full Time/Salaried/Exempt Hours Per Week: 40.00 Security Clearance: TS/SCI with Poly Level of Experience: Senior Job Description Cyber, Electronic Warfare and Space (CEWS) a division of HII provides full-spectrum cyber, EW and space capabilities that address today’s rapidly...


  • Fort Meade, United States Huntington Ingalls Industries Full time

    Requisition Number: 14969 Required Travel: 0 - 10% Employment Type: Full Time/Salaried/Exempt Hours Per Week: 40.00 Security Clearance: TS/SCI with Poly Level of Experience: Senior Job Description Cyber, Electronic Warfare and Space (CEWS) a division of HII provides full-spectrum cyber, EW and space capabilities that address today’s rapidly...


  • Fort Meade, United States Farfield Systems Full time

    Job DescriptionJob DescriptionAbout Farfield Systems, Inc.At Farfield we are committed to delivering trusted expertise to our government clients.  As we grow, our focus is on increasing opportunities for you to grow with us while still delivering the same excellence customers have grown to expect from us. We continually evaluate our environment to provide a...


  • Fort Meade, United States TechGuard Security Full time

    Job DescriptionJob DescriptionServes as an Intelligence Specialist with responsibilities for participating in the production of all-source intelligence products pertaining to cyberspace operation and planning activities. Applies a wide range of intelligence analytic skills to monitor, assess, and report on cyberspace operations, capabilities,...


  • Fort Meade, United States Jacobs Full time

    Your Impact:Jacobs is seeking experienced Digital Media Forensics Analysts to support the U.S. Army with CI and CT investigations. Analysts will combine computer science with forensic skills to recover information from computers and storage devices to recover data (e.g. documents, photos, and e-mails) from computer hard drives and other data storage devices...

  • Lead Malware Analyst

    3 weeks ago


    Fort Meade, United States Two Six Technologies Full time

    Two Six Technologies is looking to add a Lead Malware Analyst to our team. This role will be responsible for performing in depth static and dynamic analysis of complex malware. An ideal candidate for this role will have performed reverse engineering on Windows, Mac, Linux, or mobile malware in previous roles.This is an on-site position in Fort Meade,...


  • Fort Meade, United States Leidos Full time

    **Description** The Leidos Defense Group has an opening for a **Cyber Security Fusion Analyst** on the DISA GSM-O II program supporting Joint Force Headquarters DODIN at Fort Meade. **Position Summary**: GSM-O II provides network operations and cyber defense support to the Defense Information Systems Agency (DISA) in support of the DOD and COCOMs. In this...


  • Fort Meade, United States Sentar Full time

    Role Description : Sentar is seeking THREAT ANALYSTS Level 1-4 to research adversarial threats posed to various systems, technologies, operations, or missions in all appropriate intelligence sources, analyze likelihood of threat, and contribute to profiling adversarial behavior, intent, and capabilities. Qualifications: Clearance: TS/SCI with...


  • Fort Meade, United States Huntington Ingalls Industries Full time

    Requisition Number: 14955 Required Travel: 0 - 10% Employment Type: Full Time/Salaried/Exempt Hours Per Week: 40.00 Security Clearance: TS/SCI with Poly Level of Experience: Mid Job Description Cyber, Electronic Warfare and Space (CEWS) a division of HII provides full-spectrum cyber, EW and space capabilities that address today’s rapidly changing,...


  • Fort Meade, United States Huntington Ingalls Industries Full time

    Requisition Number: 14955 Required Travel: 0 - 10% Employment Type: Full Time/Salaried/Exempt Hours Per Week: 40.00 Security Clearance: TS/SCI with Poly Level of Experience: Mid Job Description Cyber, Electronic Warfare and Space (CEWS) a division of HII provides full-spectrum cyber, EW and space capabilities that address today’s rapidly changing,...


  • Fort Meade, United States Two Six Technologies Full time

    Two Six Technologies is looking to add a Lead Intrusion Analyst to our team. This role will be responsible for performing critical tasks in the incident response and threat intelligence work roles for our client. A strong candidate for this role will have performed network analysis and triage of intrusion events through multiple stages of the intrusion...

  • Cyberspace Analyst II

    3 weeks ago


    Fort Meade, United States TechGuard Security Full time

    Provides technical expertise for the identification, development and prioritization of cyberspace operations requirements, processes, procedures, and governing directives Assists in conducting cyberspace operations and defense of the DOD Information Network (DODIN) Provides situational awareness (SA) of cyber incidents, health, performance, availability,...


  • Fort Meade, United States U.S. Army Intelligence And Security Command Full time

    Conducts threat financial intelligence research and all-source analysis of data to provide threat financial intelligence products, assessments on threat financiers, facilitators, financial operations, and networks associated with counterintelligence. Serves as a General Military Intelligence Analyst in the...

  • Cloud Engineer ~ SME

    3 weeks ago


    Fort Meade, United States Invictus International Consulting, LLC Full time

    Job DescriptionJob DescriptionTitle: Cloud Engineer ~ SMELocation: Fort Meade, MD Clearance: TS/SCI with a CI polygraphResponsibilities:Perform in a Security Engineer, Subject Matter Expert, role responsible for the design, configuration, testing, and deployment, of cloud provider services such as AWS, Azure, Oracle, IBM, Google Cloud, etc. and cloud-based...

  • Cyberspace Analyst II

    3 weeks ago


    Fort Meade, United States TechGuard Security Full time

    Job DescriptionJob DescriptionProvides technical expertise for the identification, development and prioritization of cyberspace operations requirements, processes, procedures, and governing directives Assists in conducting cyberspace operations and defense of the DOD Information Network (DODIN) Provides situational awareness (SA) of cyber incidents,...

  • Cyberspace Analyst II

    2 weeks ago


    Fort Meade, United States TechGuard Security Full time

    Job DescriptionJob DescriptionProvides technical expertise for the identification, development and prioritization of cyberspace operations requirements, processes, procedures, and governing directives Assists in conducting cyberspace operations and defense of the DOD Information Network (DODIN) Provides situational awareness (SA) of cyber incidents,...

  • Sme Ii

    5 days ago


    Fort Meade, United States Sentar Full time

    Sentar is dedicated to developing the critical talent that the connected world demands to create solutions to address the convergence of cybersecurity, intelligence, analytics, and systems engineering. We invite you to join the small business team where you can build, innovate, and secure your career. Sentar is seeking a SME II - Intelligence Analyst in...


  • Meade, United States National Security Agency (NSA) Full time

    ResponsibilitiesComputer Network Defense Analysts work in multiple organizations at NSA and are primarily responsible for finding vulnerabilities, delivering analyses, crafting mitigations, developing cybersecurity products, and educating our customers to prevent and eradicate the cyber threats to the Defense Industrial Base, critical infrastructures and...