Threat Analyst SME with Security Clearance

4 weeks ago


San Antonio, United States Markesman Group Full time

Title Threat Analyst SME Location San Antonio Description Markesman Group is looking for a Threat Analyst SME to join our team in San Antonio, Texas. The Threat Analyst SME develops cyber indicators to maintain awareness of the status of the highly dynamic operating environment. They collect, processes, analyze, and disseminate cyber threat/warning assessments. Responsibilities: * Demonstrated abilities, knowledge, and skills as defined by AN-TWA-001 within the National Initiative for Cybersecurity Education (NICE) Cybersecurity Framework: * Knowledge of computer networking concepts and protocols, and network security methodologies. * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). * Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. * Knowledge of cybersecurity and privacy principles. * Knowledge of cyber threats and vulnerabilities. * Knowledge of specific operational impacts of cybersecurity lapses. * Knowledge of human-computer interaction principles. * Knowledge of network traffic analysis methods. * Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless). * Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). * Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). * Knowledge of website types, administration, functions, and content management system (CMS). * Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). * Knowledge of classification and control markings standards, policies and procedures. * Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). * Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). * Knowledge of current computer-based intrusion sets. * Knowledge of cyber intelligence/information collection capabilities and repositories. * Knowledge of cyber operations terminology/lexicon. * Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). * Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). * Knowledge of evolving/emerging communications technologies. * Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects. * Knowledge of general Supervisory control and data acquisition (SCADA) system components. * Knowledge of host-based security products and how those products affect exploitation and reduce vulnerability. * Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP). * Knowledge of how modern digital and telephony networks impact cyber operations. * Knowledge of how modern wireless communications systems impact cyber operations. * Knowledge of how to extract, analyze, and use metadata. * Knowledge of intelligence disciplines. * Knowledge of intelligence preparation of the environment and similar processes. * Knowledge of intelligence support to planning, execution, and assessment. * Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions. * Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). * Knowledge of malware. * Knowledge of operations security. * Knowledge of organizational hierarchy and cyber decision-making processes. * Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. * Knowledge of telecommunications fundamentals. * Knowledge of the basic structure, architecture, and design of modern communication networks. * Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). * Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. * Knowledge of the ways in which targets or threats use the Internet. * Knowledge of threat and/or target systems. * Knowledge of virtualization products (VMware, Virtual PC). * Knowledge of what constitutes a 'threat' to a network. * Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems.Qualifications: * Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. * Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. * Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes. * Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. * Ability to effectively collaborate via virtual teams. * Ability to evaluate information for reliability, validity, and relevance. * Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products. * Ability to focus research efforts to meet the customer's decision-making needs. * Ability to function effectively in a dynamic, fast-paced environment. * Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts-both internal and external to the organization-to leverage analytical and technical expertise. * Ability to identify intelligence gaps. * Ability to recognize and mitigate cognitive biases which may affect analysis. * Ability to recognize and mitigate deception in reporting and analysis. * Ability to think critically. * Ability to think like threat actors. * Ability to utilize multiple intelligence sources across all intelligence disciplines. * Must possess a TS/SCI clearance. About the Organization About Markesman Group Markesman Group has gathered the nation's foremost experts in Cyber, ISR, Enterprise IT and Intelligence Analysis. We seek to lead with cutting edge technology, high quality development and best value services for both the government and commercial sectors. Our team combines passion, acumen, focus, patriotism, desire, dedication and the love for the job to create value for our customers. We pride ourselves in a rigorous selection process because not only do we want the best, we want the best to want us. Working closely together as part of a service-disabled veteran owned small business, we enjoy a family environment where teammates challenge and elevate each other every day. The Markesman family is always striving to solve tomorrow's problems, today. EOE Statement We are an Equal Opportunity/Affirmative Action Employer. We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state, or local law. This position is currently accepting applications.



  • San Antonio, United States Independent Software Full time

    What you will be doing! Independent Software is hiring Threat Analysts, Level 1-4. Candidate will research adversarial threats posed to various systems, technologies, operations, or missions in all appropriate intelligence sources, analyze likelihood of threat, and contribute to profiling adversarial behavior, intent, and capabilities. Key Requirements: *...


  • San Antonio, United States Markesman Group Full time

    Title Exploitation Analyst SME Location San Antonio Description Markesman Group is looking for an Exploitation Analyst SME to join our team in San Antonio, Texas. The Exploitation Analyst SME collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. They leverage all authorized resources...


  • San Antonio, United States Markesman Group Full time

    Title Vulnerability Assessment and Management SME Location San Antonio Description Markesman Group is looking for a Vulnerability Assessment and Management SME to join our team in San Antonio, Texas. Vulnerability Assessment and Management SME performs assessments of systems and networks within the network environment or enclave and identifies where those...


  • San Antonio, United States Secure Innovations LLC Full time

    Why Work at SI? Secure Innovations (SI) successfully and continuously strives to become experts in the Cybersecurity field by only focusing on Cyber! Because of this, we proudly stand behind our motto, "We're Not Standard Cyber. We're the Cyber Standard." SI was built on the principle that people matter first and foremost. SI believes in providing a strong...


  • San Antonio, United States Sentar Inc Full time

    Sentar is dedicated to developing the critical talent that the connected world demands to create solutions to address the convergence of cybersecurity, intelligence, analytics, and systems engineering. We invite you to join the small business team where you can build, innovate, and secure your career. Sentar is seeking Threat Analysts Level 1-4 in San...


  • San Antonio, United States University Health Full time

    POSITION SUMMARY/RESPONSIBILITIES The Senior Cyber Security Analyst must have a deep understanding of information security protocols and a passion for protecting Community First Health Plans Inc. (Community First) healthcare data. In this role, the Senior Analyst will be instrumental in establishing and maintaining security standards across Community First....


  • San Antonio, United States Independent Software Full time

    What you will be doing! Independent Software is hiring Threat Analysts, Level 1-4. Candidate will research adversarial threats posed to various systems, technologies, operations, or missions in all appropriate intelligence sources, analyze likelihood of threat, and contribute to profiling adversarial behavior, intent, and capabilities. Key...


  • San Antonio, United States Independent Software Full time

    Job Description Job Description What you will be doing! Independent Software is hiring Threat Analysts, Level 1-4. Candidate will research adversarial threats posed to various systems, technologies, operations, or missions in all appropriate intelligence sources, analyze likelihood of threat, and contribute to profiling adversarial behavior, intent, and...


  • San Antonio, United States Independent Software Full time

    Job DescriptionJob DescriptionWhat you will be doing!Independent Software is hiring Threat Analysts, Level 1-4.  Candidate will research adversarial threats posed to various systems, technologies, operations, or missions in all appropriate intelligence sources, analyze likelihood of threat, and contribute to profiling adversarial behavior, intent, and...

  • OSINT Collector

    1 day ago


    San Antonio, United States Parsons Full time

    In a world of possibilities, pursue one with endless opportunities. Imagine Next! When it comes to what you want in your career, if you can imagine it, you can do it at Parsons. Imagine a career working with intelligent, diverse people sharing a common quest. Imagine a workplace where you can be yourself. Where you can thrive. Where you can find your next,...


  • San Antonio, United States Sandoval Technology Solutions, LLC. Full time

    **Job Summary:** We are seeking an Information Security Analyst with a Department of Defense (DoD) Top Secret (TS) clearance to join our team. The ideal candidate will be responsible for ensuring the security and integrity of our organization's information systems and data. **Qualifications:** - Bachelor's degree in Computer Science, Information Technology,...


  • San Antonio, United States Smart Synergies Full time

    Client is looking for someone with flexibility and desire to engage as part of a small, high-performance team. Monitor, evaluate, and maintain systems and procedures to protect the data systems and databases from unauthorized users. Identify potential threats and respond to reported security violations. Determine causes of security breaches and research,...


  • San Antonio, United States ITI Solutions Inc. Full time

    Security Engineer/ Data Security Analyst IV ITI is seeking an experienced Cybersecurity engineers to work out of Lackland AFB. IS3 provides cybersecurity support to 16th Air Force. Responsibilities: Proficient in use of RMF methodology, its associated assessments and report requirements, understanding of the plans and policies POC, and conduct timely and...


  • San Antonio, United States Sandoval Technology Solutions LLC Full time

    Job DescriptionJob Description**Job Summary:**We are seeking an Information Security Analyst with a Department of Defense (DoD) Top Secret (TS) clearance to join our team. The ideal candidate will be responsible for ensuring the security and integrity of our organization's information systems and data.**Qualifications:**- Bachelor's degree in...


  • San Antonio, United States Applied Research Solutions Full time

    Description Applied Research Solutions is seeking a full-time Acquisition Security SME located at Lackland AFB – San Antonio, TX.​ Why Work with us ? Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled,...


  • San Antonio, United States Cherokee Federal Full time

    Business Analyst III Please Note: This position is pending a contract award. If you are interested in a future with Cherokee Federal, APPLY TODAY! Although this is not an approved position, we are accepting applications for this future and anticipated need. This position requires an active Public Trust clearance or the ability to obtain a Public Trust...


  • San Antonio, United States RealmOne Full time

    We're searching for talented individuals who provide intelligence, statistical analysis and programming expertise for the Government. This program will maximize the effectiveness and efficiency of our country's most important missions both at home and abroad. If you are ready to support a high-performing team that truly makes a difference, then come join us!...


  • San Diego, United States Leidos Full time

    R-00129097 Description Today, Electronic Warfare is a still-growing enterprise – protecting the warfighter and our national security against ever-adapting threats. Leidos Innovations Center (LInC) currently has an opening for a Program Analyst to support EW development programs in San Diego, CA. You’ll be part of a team focused on improving the...


  • San Antonio, United States Jacobs Technology, Inc. Full time

    Your Impact: The mission of the Jacobs Lone Wolf Team is to support, operate, and maintain a DoD provided, integrated voice, video, and data global communications network that facilitates collaboration among senior leaders and key staff. Candidates are expected to have a strong work ethic and possess the ability to work as a critical member of a team in...


  • San Antonio, United States Intelligent Waves Full time

    Overview: Since 2006, Intelligent Waves has delivered mission-focused multi-domain operational expertise and innovation to the Government through high-impact technology solutions in cybersecurity, data science, enterprise network engineering, software development, and platform mission support. Always ready. Anytime. Anywhere. Any domain. Intelligent Waves...