Jacobs Cyber Threat Intelligence and Information Sharing Team Analyst in Woodlawn, Maryland

Cyber Threat Intelligence and Information Sharing Team Analyst

Description

“Jacobs National Security Solutions (NSS) provides world-class IT network and service management capabilities; cutting edge cyber threat awareness and cybersecurity solutions; innovative web- and software applications development; and advanced data analytics for major clients in the Intelligence Community, Department of Defense, and Federal Civilian Agencies.

Our forward thinking solutions deliver an integrated approach to IT network design and management, full lifecycle IT service management, IT service delivery, asset management, logistics and procurement, and vendor management. We leverage the expertise and passion of our employees to conduct identity and access management, penetration testing, and vulnerability assessments for our nation’s most closely guarded agencies and networks. Our Cyber Security Operations Centers ensure safe, effective network operations for Federal clients while our data scientists are helping stop illegal acts before they can endanger Americans or our way of life.

Jacobs promotes a culture of operational excellence to create a safer, smarter, and more connected world while upholding the highest standards of compliance, quality and integrity.

We continue to thrive and need your talent and motivation to help propel us farther, faster.”

Jacobs is seeking a Cyber Threat Intelligence and Information Sharing Team Analyst for the Woodlawn, MD office. Duties will include:

  • Assist the CTI team conducts OSINT research on daily basis and the role requires daily monitoring of social media activities involving the healthcare sector whether directly or indirectly.

  • Identifying actionable technical indicators for SOC action; article of interest for leadership; and identifying trends in the healthcare sector in whole and gauging the mood of the public

  • CTI analyst will perform general research or focused research on specific information of interest and provide findings to the CCIC teams and other recipients.

  • Provide research function to address the team’s Counterintelligence (CI)

  • Generate content for the requested presentation whether it is for a recurring activity or an ad-hoc requirement.

  • Conduct a system research of topical area of interest and prepare the presentation

  • CTI analyst will be responsible for preparing and delivering the presentation once assigned.

  • Due to the nature CTI mission, communications beyond departments are often required to coordinate either analytical findings or to submit an RFI.

  • CTI analyst will coordinate with assigned GTLs and other fed functional areas to coordinate and collate information of significance.

  • Provides weekly accomplishment input to the lead.

  • Participates in conferences

  • Participates in the weekly and bi-weekly info sharing and collaboration meetings (webex)

Qualifications

  • US Citizens only – must be able to obtain a public trust clearance

  • Bachelor of Science degree in Information Technology, IT Security, Network Systems Technology or related field or equivalent experience plus five (5) to seven (7) years of directly related experience or any equivalent combination of education, experience, training and certifications.

  • Certification Requirements: Either Network , Security or CEH

  • Minimum Qualifications:

  • Able to work independently

  • Strong interpersonal and communications skills

  • Must be able to work with professionals of varying sectors and skills and technical knowledge

  • Working knowledge in the cleared community

  • 6 years of experience in cyber counterintelligence and investigations background with the following working knowledge:

  • Cyber threat intelligence research and analysis and workflow

  • Network incident response

  • Technical report writing

  • Investigative or analytical report writing

  • Technical knowledge in methods and procedures for network exploitation and mitigation

  • Must be able to distinguish different types of exploitation methods

  • Must be able to understand the different methods of network communication

  • Demonstrate knowledge in the TCP/IP and OSI model and apply the concept to analysis of log files and metadata such as pcap, netflow data and email metadata

  • Application of critical thinking in conducting analysis

  • Working knowledge in threat actor/indicators research and analysis

  • Working knowledge in modus operandi of nation state actors and associated tactics, techniques and procedures

  • Experience and confidence in briefing senior staffs

  • Working knowledge in information handling and information sharing

  • Must possess independent reference and resource libraries on the web

  • Strong knowledge in multi-disciplined full spectrum cyber operations and the difference between the disciplines and taxonomy

  • Experience in handling sensitive and/or classified data as needed

  • Experience in conducting research in classified environment

  • Experience in aggregating data and writing periodic trend reports

  • Experience in cyber insider threat program

  • Desired Qualifications:

  • Knowledge in malware analysis

  • Knowledge in host based forensics

  • Prefer prior law enforcement experience (DoD or federal)

  • Prefer prior counterintelligence operations and investigations

  • Prefer experience in cyber defense operations

  • Prefer info sharing experience in joint environments (JTF/DC3/DHS, etc)

Essential Functions:

Physical Requirements:

Most work will be done at a desk or computer.

Work Environment:

General Office environment. The work environment is fast-paced and sometimes involves extreme deadline pressures. The nature of the work requires a high degree of teamwork and cooperation with other members of the staff as well as individuals across the Company and Customers.

Equipment & Machines:

General office equipment including PC/laptop, Fax, Copiers, Shredder, Printers, Telephone, and other miscellaneous office equipment.

Attendance:

Attendance is critical at all times. Must be able to work a 40-hour workweek, normally Monday through Friday. However, times and days may vary depending on business requirements. Needs to be available to work overtime during critical peaks and be available to meet last minute requests for overtime should the situation occur.

Other Essential Functions:

Must be able to communicate effectively both verbally and in writing

Grooming and dress must be appropriate for the position and must not impose a safety risk/hazard to the employee or others. Must put forward a professional behavior that enhances productivity and promotes teamwork and cooperation. Must be able to interface with individuals at all levels of the organization both verbally and in writing. Must be well-organized with the ability to coordinate and prioritize multiple tasks simultaneously. Must work well under pressure to meet deadline requirements. Must be willing to travel as needed. Must take and pass a drug test and background check as well as a motor vehicle records check. Must be a US citizen.

#cjpost

Jacobs is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status or other characteristics protected by law. Jacobs is a background screening, drug-free workplace.

Primary Location United States-Maryland-Woodlawn

Req ID: ATE0000YK