Delta Risk - Cyber Security Careers

Careers

Delta Risk is continually looking for talented cyber security professionals to join us as employees, consulting partners, or teammates. We have immediate needs for both administrative and cyber security jobs listed, and we always welcome resumes from qualified cyber security professionals for current and future hiring needs.

We look for candidates with cyber security skills in our service offerings and with domain experience in the markets we serve. Our jobs require candidates to hold an undergraduate degree, and for most roles we prefer advanced degrees. Successful candidates also have strong consulting, communications, and interpersonal skills, and live by our Core Principles.

Current Openings

Senior Cyber Intelligence Analyst

Job Title
Senior Cyber Intelligence Analyst
Job ID
27209314
Location
Linthicum,  MD 21090
Other Location
Description

The selected candidate will serve as a senior cyber intelligence analyst in the Defense Cyber Crime Center – Analytical Group (DC3-AG) performing analysis on existing and emerging advanced persistent threat (APT) organizations, actors, and malware. The candidate will use their experience, knowledge, and analytical skills to support DoD law enforcement and counterintelligence (LE/CI) operations and investigations, and will engage LE/CI counterparts to support the collection and processing of technical intelligence information regarding advanced persistent threat (APT) activity.

Responsibilities will include evaluation of technical data (including packet capture data and malware command and control) to support the development of technical analysis reports relating to current cyber threats for release/publication/dissemination to U.S. Department of Defense and U.S. Intelligence Community consumers. Analysts will work with contractor, government project leads, and management to develop technical documents that contain both textual analysis and graphics or imagery specifically developed to support analytic conclusions. The selected candidate should be comfortable developing and editing documents up to 60 pages in length. The ideal candidate is an experienced and highly technical cyber intelligence analyst or law enforcement/counterintelligence (LE/CI) analyst or agent, who has applied their mastery of cyber threat intelligence, intelligence analysis techniques, and sources and methods to produce high quality analysis products for the last 5 years.

Delta Risk LLC is a proud equal opportunity/affirmative action employer who is committed to hiring and retaining a diverse workforce.  Delta Risk LLC does not make employment decisions based upon race, color, creed, religion, sex, sexual orientation, gender identity, national origin, age, veteran status, disability, or any other protected class.

 

 

LCAT:

 

·        Possesses and applies a comprehensive knowledge across key tasks and high impact assignments. Plans and leads major technology assignments.

 

·        Evaluates performance results and recommends major changes affecting short-term project growth and success. Functions as a technical expert across multiple project assignments. May supervise others.

 

Suggested Qualifications:

 

18-22 years of professional experience without a degree; or 10-14 years of professional experience with a Bachelor’s degree from an accredited college in a related discipline, or equivalent experience/combined education; or 8-12 years of professional experience with a related Master’s degree; or 4 years of professional experience required with a related PhD or JD; Considered an emerging authority / authority in discipline. Consideration should always be given for the level of specific domain expertise.

Required Skills

• Clearance required- TS/ SCI -candidates with CI Poly preferred, but not necessary to start.
• BA/BS degree in Information Technology or Information Security, Computer Science, Intelligence Studies, Cyber Security or another related field of study or equivalent 3+ years performing technical cyber threat intelligence analysis.
• Strong technical skills proficiency in the following areas: network communication using TCP/IP protocols, basic system administration, basic understanding of malware (malware communication, installation, malware types), intermediate knowledge of computer network defense operations (proxy, firewall, IDS/IPS, router/switch) and open source information collection.
• Strong knowledge of Cyber Threat Intelligence principles to include indicators of compromise (IOC) types, indicator pivoting and indicator attribution strength.
• Strong proficiency hunting APT data using open source cyber threat analytic tools or data repositories such as VirusTotal, Passive Total, Threat Miner, or Maltego.
• Strong understanding of US Intelligence Community and how cyber intelligence Organizations work together for purposes of conducting cyber threat analysis.
• Strong proficiency and recent experience (within last 3 years) performing NETFLOW and PCAP analysis using common analysis tools (examples include Wireshark, Splunk, ChopShop, Dshell, Network Miner, Moloch, etc).
• Strong proficiency Report writing - a technical writing sample and technical editing test will be required if the candidate has no prior published intelligence analysis reporting.
• Strong or Intermediate ability to apply formal intelligence analysis methods, develop hypothesis, prove/disprove relationships, always ask why, defend your analysis, and apply attribution to cyber threat activity.
• Candidate must be able to make condense based Assessments for purposes of attribution based on their technical analysis of network traffic, multi-source data, malware and system forensic analysis. Candidate must be able to identify analytic bias.
• Intermediate ability to build intrusion related data visualizations and perform analysis (i.e., using I2 Analyst Notebook, Netviz, Palantir, etc)
• Intermediate ability to present technical information and analysis to groups up to 50 persons on a quarterly basis. Candidate will be required to brief smaller groups up to 10 persons on a weekly basis.
• Self-starter with the ability to proactively engage and develop relationships with intrusion set subject matter experts and analyst counterparts across the US Intelligence and Law Enforcement communities
Optional Skills

• Existing Subject Matter Expert of Advanced Persistent Threat activity
• Formal training as an intelligence analyst in any discipline, graduate of US Govt. intelligence analysis course: CAC, IBC, Kent School, IC 101, Analysis 101, Army, Navy, Air Force, etc.
• Experience applying Kill Chain analysis, Cyber Intelligence Preparation of the
• Environment (CIPE) modeling, or Diamond modeling of cyber threat activity
• Certifications (any): CISSP, CEH, Security+, SANS certification(s), Network+, CCNA
• Advanced NETFLOW and PCAP Analysis
• Advanced Data Visualization proficiency leveraging COTS/GOTS tools
• Technical Skills proficiency: Python language, encryption technologies/standards
• Intermediate malware analysis or digital computer forensics experience
• Any type of Cyber related Law Enforcement or Counterintelligence experience
• Experience using COTS/Open Source tools: Novetta Cyber Analytics, Mitre, ChopShop and/or ARL DSHELL.
• Analyst experience in Federal Cyber Center, NSA, or Corporate CIRT

Option 1: Create a New Profile


Delta Risk LLC is a proud equal opportunity/affirmative action employer who is committed to hiring and retaining a diverse workforce. Delta Risk LLC does not make employment decisions based upon race, color, creed, religion, sex, sexual orientation, gender identity, national origin, age, veteran status, disability, or any other protected class.

Delta Risk LLC is committed to working and providing reasonable accommodation to individuals of all abilities, including persons with disabilities. If at any time during the application process, you need an accommodation, please contact accommodations@deltarisk.com for assistance.