This site uses cookies. To find out more, see our Cookies Policy

Senior Information Security Threat Detection Analyst in Rockville, MD at ConsultNet

Date Posted: 1/19/2019

Job Snapshot

Job Description

Our client, a full-service Information Technology (IT) company, focused in Federal and Health IT sector. We are seeking a Senior Information Security Threat Detection Analyst who will be a key member of a consulting team providing advice and support, to federal agencies, in the Risk Management areas of Information Security. Previous experience in the federal space is highly preferred.

This role will be primarily responsible for developing unique cyber indicators to maintain constant awareness of the status of the operating environment by collecting, processing, analyzing and disseminating cyber threat warning assessments.

  • Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities; Provide subject matter expertise to the development of cyber operations specific indicators; Maintain a common intelligence picture.
  • Brief threat related current situations. Collaborate with intelligence analysts/targeting organizations involved in related areas. Conduct in-depth research and analysis. Conduct nodal analysis. Develop information requirements necessary for answering priority information requests. Evaluate threat decision-making processes.
  • Identify threat tactics, and methodologies. Identify intelligence gaps and shortfalls. Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets.
  • Monitor and report on validated threat activities. Monitor open source websites for hostile content directed towards organizational or partner interests.
  • Monitor operational environment and report on adversarial activities which fulfill leadership's priority information requirements.
  • Produce timely indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies)
  • Provide SME and support to planning/developmental forums and working groups as appropriate.
  • Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations.
  • Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations.
  • Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities.
  • Report intelligence-derived significant network events and intrusions.
  • Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up-to-date.
  • Conduct digital forensic analysis through email forensics, registry analysis, user forensic analysis, artifact analysis, log analysis, timeline analysis, file system analysis, malware analysis

Job Requirements

  • BA or BS degree in Computer Science\Security or related discipline (Masters preferred).
  • Industry standards such as GCIH or related GIAC (preferred but not required).
  • Preferred experience in policy and procedure development, report writing and presentations.
  • Minimum 5 years' experience in Information Security is required along with minimum of 3 years of hands-on experience in at least 3 of the following:

    • Coordinating, validating, and\or managing of all-source collection requirements
    • Identifying threats and vulnerabilities
    • Briefing threat related current situations
    • Conducting in-depth research and analysis (structured/gap/nodal) on threats and intelligence
    • Serving as a technical expert and liaison to explain incident details
    • Log correlation from various sources

  • Must be able to communicate complex-technical issues in simple terms and clearly, both orally and in writing, to a wide audience; Strong Interpersonal skills and the ability to work as part of a team.
  • Must be able to exercise discretion and maintain confidentiality.
  • Proficient in reporting and answering analytical questions using vulnerability data.

Must Know

  • Risk management processes (e.g., methods for assessing, mitigating and accepting risks).
  • Cybersecurity principles, security models, organizational requirements (w.r.t. confidentiality, integrity, availability, authentication, non-repudiation), cyber threats, risks and vulnerabilities, cryptography and cryptographic key management concepts, host/network access control mechanisms (e.g., ACLs), network access, identity, & access management (e.g., PKIs), Computer networking concepts and protocols, and network security methodologies. 
  • Ethical hacking principles, general attack stages; Specific operational impacts of cybersecurity lapses; programming language structures and logic.
  • Basic system administration, network, and operating system hardening techniques 

Be a part of the ConsultNet difference. As a leading national provider of IT staffing and solutions, ConsultNet delivers exceptional services to startup, midmarket and Fortune 1000 companies across North America. Since 1996, we've partnered with clients to create rewarding opportunities for our consultants, successfully building teams that have surefire results.

In the past two years alone, we have placed more than 1,500 consultants in contract, contract-to-hire, or direct placement opportunities. We understand communication is key to finding the right job that matches your skills and career goals. For us, it's not just the work that we do; it's how we do the work. Our breadth of offerings extends to multiple IT positions in major markets throughout the country, see more at