694 Threat Analyst jobs in the United States

ELINT Threat Analyst

21005 Aberdeen Proving Ground, Maryland CACI International

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

ELINT Threat Analyst
Job Category: Intelligence
Time Type: Full time
Minimum Clearance Required to Start: Secret
Employee Type: Regular
Percentage of Travel Required: Up to 10%
Type of Travel: Outside Continental US
* * *
**The Opportunity:**
CACI is seeking an EW/SIGINT Threat Analyst to support the U.S. Army at Aberdeen Proving Ground, MD. You will be part of an integrated team to maintain effectiveness in defeating worldwide electronic warfare and signals threats while using your problem-solving skills and able to work with a team while in support of on-going projects managed from the Communications Electronic Command Software Engineering Center's Army Reprogramming Analysis Team (ARAT) Program Office.
**Responsibilities:**
+ Support development software reprogramming requirements for the AN/APR-39 and AN/APR-48 Radar Signal Detection Systems (RSDS) found onboard Army aviation platforms such as the UH-60 Blackhawk and AH-64 Apache helicopters.
+ Analyze the Order of Battle (OB) and extract weapon system and emitter information to create a prioritized list of threats to be reprogrammed into MDS software.
+ Develop MDS reprogramming and simulation requirements in the form of a Threat Analysis Specification (TAS) to meet emerging threats.
+ Critically analyze and review results of tests against developmental MDS programming to confirm system threat detection requirements from the TAS are met. Conduct Verification and Validation tests of MDS programming before it is released to the field.
+ Develop Aviator Product documentation for aircrew such as Kneeboard Cards and Pertinent Notes.
+ Conduct analysis of new threats to aviators in the field and write System Impact Messages that detail indications of the threat relevant to their ASE.
+ Perform independent reviews of intelligence briefings, reports and information/issue papers produced by Service Production Centers.
The primary focus of this position is to provide support services to the Threat Analysis (TA) Branch within ARAT-PO. The Threat Analyst shall be responsible for supporting the development of Mission Data Set (MDS) software for the ARAT-TA Branch through analysis of air defense systems, as well as to provide intelligence data and threat information for Aircraft Survivability Equipment and Electronic Warfare systems fielded to the US Army.
**Qualifications:**
_Required:_
+ An active DoD SECRET, but prefer TS/SCI Level Clearance.
+ Bachelor's degree is strongly preferred.
+ At least 3 years of relevant experience.
+ Strong communication skills, both written and oral.
+ Strong Microsoft Excel, PowerPoint, and Word skills.
+ Exceptional analytical, critical thinking and problem-solving skills.
+ Ability to independently conduct research and gather information related to threats and intelligence data.
_Desired:_
+ Prior applicable military experience in Electronic Warfare, specifically with air defense systems.
+ Knowledge in intelligence data such EWIR, CED, ELINT, and AFTTP.
+ Experience and knowledge of Electronic Warfare systems such as the US Army Aircraft Survivability Equipment systems like the AN/APR-39 and AN/APR-48.
+ Able to digest new technical information at a rapid pace for practical use.
+ Excellent time management skills.
+ Flexibility to work with changing requirements as developed and communicated from customer feedback.
+ Eagerness to improve efficiency and streamline work procedures.
-
**___**
**What You Can Expect:**
**A culture of integrity.**
At CACI, we place character and innovation at the center of everything we do. As a valued team member, you'll be part of a high-performing group dedicated to our customer's missions and driven by a higher purpose - to ensure the safety of our nation.
**An environment of trust.**
CACI values the unique contributions that every employee brings to our company and our customers - every day. You'll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality.
**A focus on continuous growth.**
Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground - in your career and in our legacy.
**Your potential is limitless.** So is ours.
Learn more about CACI here. ( Range** : There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here ( .
The proposed salary range for this position is:
$63,300 - 129,700 USD
_CACI is_ _an Equal Opportunity Employer._ _All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any_ _other protected characteristic._
View Now

Insider Threat Analyst

35808 Redstone Arsenal, Alabama Parsons Corporation

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

In a world of possibilities, pursue one with endless opportunities. Imagine Next!
When it comes to what you want in your career, if you can imagine it, you can do it at Parsons. Imagine a career working with exceptional people sharing a common quest. Imagine a workplace where you can be yourself. Where you can thrive. Where you can find your next, right now. We've got what you're looking for.
**Job Description:**
Parsons are seeking a highly analytical and detail-oriented professional to join our team in support of insider threat detection and intelligence analysis. This role involves identifying trends, uncovering anomalies, and discerning complex patterns across political, military, and economic developments within assigned Areas of Responsibility (AORs) and Areas of Interest (AOIs).
Key Responsibilities:
+ Decipher underlying trends or uncover anomalies and discern obscure patterns and attributes.
+ Monitors and analyzes all strategic and operational aspects of political, military, and economic developments for the countries in the AORs and AOIs.
+ Elevate events of concern and produce proactive Insider Threat leads that document issues on computer misuse, various violations of policies, counterintelligence concerns, foreign influence, financial stressors, threats to self or others, Continuous Evaluation (CE), adjudicative and other insider threat concerns.
+ Produce Insider Threat Referral Reports (e.g., investigative leads) that document computer misuse, violations of policies, counterintelligence concerns, foreign influence, financial stressors, threats to self or others, CE adjudicative, and other insider threat concerns.
+ Complete special analytical projects as directed by leadership.
+ Access network monitoring, data analytic, and other tools, integrate available information, decipher underlying trends and anomalies, and discern obscure patterns found in the data.
+ Prepare and present finalized, professional briefings and reports in accordance with formats established in the standard operating procedures and writing guide.
+ At the direction of government, perform proactive inquiries, and collaborate with internal and external investigative, intelligent community, and law enforcement agencies or entities, as required.
+ May support policy and procedure development for agency, interagency, or community-wide support.
+ Support development and analysis of intelligence products. Presents analyses or products to clients.
+ Prepare and present analysis, in the form of briefings and/or reports, to leadership.
**Required Qualifications** :
+ High school diploma with a minimum of 3 years of experience in cyber analysis or intelligence.
+ Active Top Secret clearance.
+ Eligibility to obtain and maintain SCI and CI Polygraph.
+ Proven experience in analytical problem-solving related to insider threat, counterintelligence investigations, and counterespionage.
+ Familiarity with insider threat data analytics tools and network monitoring systems.
+ Strong understanding of intelligence regulations, oversight principles, and geospatial-intelligence capabilities.
+ Exceptional writing and briefing skills with a demonstrated ability to publish analytical products.
**Preferred Qualifications** :
+ Bachelor's degree.
+ 5+ years of experience in cyber analysis or intelligence operations.
**Security Clearance Requirement:**
An active Top Secret SCI w/Polygraph security clearance is required for this position.
This position is part of our Federal Solutions team.
The Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our intelligent employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now.
We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle!
Parsons is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status.
We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the Parsons quest-APPLY TODAY!
Parsons is aware of fraudulent recruitment practices. To learn more about recruitment fraud and how to report it, please refer to .
About Us
Parsons is a digitally enabled solutions provider focused on the defense, security, and infrastructure markets. With nearly 75 years of experience, Parsons is uniquely qualified to deliver cyber/converged security, technology-based intellectual property, and other innovative services to federal, regional, and local government agencies, as well as to private industrial customers worldwide.
Parsons is an equal opportunity, drug-free employer committed to diversity in the workplace. Minority/Female/Disabled/Protected Veteran/LGBTQ+.
For more about Parsons, visit parsons.com and follow us on Facebook, Twitter, LinkedIn, and YouTube.
View Now

Cyber Threat Analyst

30309 Midtown Atlanta, Georgia Electrosoft

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Cyber Threat Analyst
Posted: 10/06/2025
Electrosoft Services, Inc. is an award-winning company that provides comprehensive technology-based solutions and services to federal customers. While cybersecurity is our specialty, we also focus on ICAM, enterprise IT modernization, and software solutions. We always seek to delight our customers, so we retain highly qualified employees and offer them meaningful work, growth opportunities, and work-life balance. What sets us apart from all other contractors is the sense of teamwork our employees feel - and the knowledge that outstanding effort is recognized and rewarded. The camaraderie we share emanates from Lunch & Learn sessions where we explore new ideas together, fun group activities ranging from escape rooms to miniature golf, and much, much more. If we've described you and your dream workplace, please apply and share in the many benefits and opportunities we offer.
Senior Cybersecurity Threat Analyst
Overview
Seeking a seasoned Managerial Cybersecurity Contractor to lead and oversee multiple cybersecurity workstreams within its Cybersecurity Operations. This leadership role is pivotal in coordinating and executing cybersecurity initiatives that protect HHS and its partners in the Healthcare and Public Health (HPH) sector. The contractor will manage complex projects, guide intelligence operations, and mentor junior analysts while ensuring alignment with HHS standards and strategic objectives.
Key Responsibilities
+ Project & Task Management
+ Lead planning, execution, and closure of cybersecurity projects.
+ Develop project plans with timelines, milestones, and risk mitigation strategies.
+ Manage interdependent tasks and contractor resources to ensure timely delivery.
+ Threat Intelligence Oversight
+ Supervise threat intelligence collection and analysis using platforms like Intel 471 and Mandiant.
+ Prioritize intelligence focused on threats targeting HHS systems.
+ Threat Actor Profiling & Reporting
+ Oversee development of threat actor profiles and intelligence products.
+ Ensure editorial consistency and quality across all contractor-generated reports.
+ Identify and track emerging cyber threats specifically targeting HHS and the HPH Sector.
+ Analyze how general cybersecurity trends might uniquely impact healthcare organizations.
+ Conduct deep-dive investigations into government-specific malware, ransomware, and other malicious tools.
+ Assess the potential impact of software vulnerabilities on critical HHS systems.
+ Stay abreast of regulatory changes in government cybersecurity and incorporate this into threat assessments.
+ Product Development & Editing
+ Create and refine cybersecurity documentation tailored for technical and executive audiences.
+ Conduct peer reviews to maintain clarity, accuracy, and relevance.
+ Stakeholder Engagement & Briefings
+ Lead threat briefings for HHS leadership, technical teams, and external partners.
+ Facilitate meetings and communicate threat insights effectively.
+ Information Sharing & Relationship Building
+ Build relationships with internal and external cybersecurity stakeholders.
+ Coordinate information sharing initiatives across government and private sectors.
+ Threat Landscape Monitoring & Response
+ Guide use of automated tools for continuous threat monitoring.
+ Implement strategic intelligence initiatives to anticipate and mitigate cyber threats.
+ Analyze geopolitical events and trends to anticipate potential cyber threats to the healthcare sector.
+ Utilize Threat Connect for information sharing and ingestion.
+ Develop Tines workflows for information gathering and enrichment.
+ Specialized Tool Utilization
+ Ensure effective use of platforms like Intel 471, Mandiant, and Power BI for threat analysis and visualization.
+ Utilize advanced data analytics tools to correlate threat data from multiple sources.
+ Develop machine learning algorithms to identify patterns and connections in large volumes of threat data.
+ Conduct in-depth research to provide historical context and potential future implications of current threats.
+ Create detailed profiles of threat actors, including their motivations, capabilities, and historical activities.
+ Team Leadership & Development
+ Mentor junior analysts and foster a collaborative, high-performance environment.
+ Set clear performance standards and support professional growth.
+ Risk Management
+ Identify and manage cybersecurity risks across projects.
+ Maintain risk registers and provide actionable mitigation strategies.
+ Reporting & Communication
+ Prepare executive summaries, dashboards, and presentations for HHS leadership.
+ Ensure transparent communication across all project stakeholders
Basic Qualifications
+ Proven experience managing complex cybersecurity projects in a contractor capacity.
+ Strong understanding of OSINT methodologies and threat intelligence tools.
+ Demonstrated leadership in team development and stakeholder engagement.
+ Ability to work independently while aligning with federal cybersecurity standards.
+ Eligible for TS/SCI clearance.
All qualified applicants are considered for employment, and employees are treated during employment without regard to race, color, religion, sex, national origin, age, citizenship, disability, or Veteran status. Additionally, the company provides reasonable accommodations to qualified individuals with disabilities.
View Now

Global Threat Analyst

20080 Washington, District Of Columbia Google

Posted 6 days ago

Job Viewed

Tap Again To Close

Job Description

Global Threat Analyst
_corporate_fare_ Google _place_ Washington D.C., DC, USA
**Mid**
Experience driving progress, solving problems, and mentoring more junior team members; deeper expertise and applied knowledge within relevant area.
**Minimum qualifications:**
+ Bachelor's degree or equivalent practical experience in investigations.
+ 4 years of experience analyzing risk, authoring reports, and conducting briefings that provide stakeholders with proactive, actionable insight about security concerns.
+ 4 years of experience in a corporate, government, nonprofit or academic environment, working in support of decision-making processes.
+ Experience in investigative and risk analysis.
**Preferred qualifications:**
+ 5 years of experience analyzing strategic enterprise risk as it relates to security, economic, policy and social developments that are big-picture and granular in nature.
+ 5 years of experience partnering with cross-functional teams and external counterparts to support business leaders, manage risk and complete projects.
+ Experience with critical infrastructure or corporate development risk.
**About the job**
Security is at the core of Google's design and development process: it is built into the DNA of our products. The same is true of our offices. You're an expert who shares our seriousness about security and our commitment to confidentiality. You'll collaborate with our Facilities Management team to create innovative security strategies, investigate breaches and create risk assessment plans for the future. You believe that providing effective security doesn't come at the expense of customer service - you will be our bodyguard (and our long lost pal).
From keeping Googlers safe and secure to managing disruptive events, the ability to anticipate, deter, detect, and act are the pillars of Google's Global Security and Resilience Services (GSRS) team. As a member of GSRS you will help develop a culture where safety, security and resiliency are integrated into every facet of Google, including the creative process. You will help us continually identify, evaluate and monitor enterprise risks that could affect business activities and provide business leaders the information they need to make critical decisions. You'll collaborate with cross-functional teams to create innovative strategies and develop programs that drive sustainable effectiveness.
The US base salary range for this full-time position is $102,000-$146,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more aboutbenefits at Google ( .
**Responsibilities**
+ Develop, maintain, and execute protocols and practices to assess and mitigate threats to company assets, and manage crises and deliver threat assessment services.
+ Research how threats show up within the ecosystem, and understand emerging threats and trends, with an emphasis on geopolitical, cultural, or societal-specific differences, and provide trend and data analysis and performance reporting for security related disciplines.
+ Develop reports based on investigation and report findings to appropriate business and law enforcement stakeholders, and collect feedback, ensure documentation is up to date, facilitate discussions to follow up with stakeholders, and propose or implement changes for continuous improvement.
+ Conduct, assist, or provide guidance in investigations related to security risk and violations. monitor Google's networks and systems for security breaches or intrusions, and install software that helps to notify stakeholders regarding intrusions.
Information collected and processed as part of your Google Careers profile, and any job applications you choose to submit is subject to Google'sApplicant and Candidate Privacy Policy (./privacy-policy) .
Google is proud to be an equal opportunity and affirmative action employer. We are committed to building a workforce that is representative of the users we serve, creating a culture of belonging, and providing an equal employment opportunity regardless of race, creed, color, religion, gender, sexual orientation, gender identity/expression, national origin, disability, age, genetic information, veteran status, marital status, pregnancy or related condition (including breastfeeding), expecting or parents-to-be, criminal histories consistent with legal requirements, or any other basis protected by law. See alsoGoogle's EEO Policy ( ,Know your rights: workplace discrimination is illegal ( ,Belonging at Google ( , andHow we hire ( .
If you have a need that requires accommodation, please let us know by completing ourAccommodations for Applicants form ( .
Google is a global company and, in order to facilitate efficient collaboration and communication globally, English proficiency is a requirement for all roles unless stated otherwise in the job posting.
To all recruitment agencies: Google does not accept agency resumes. Please do not forward resumes to our jobs alias, Google employees, or any other organization location. Google is not responsible for any fees related to unsolicited resumes.
Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also and If you have a need that requires accommodation, please let us know by completing our Accommodations for Applicants form:
View Now

Cyber Threat Analyst

22212 Arlington, Virginia ICF

Posted 9 days ago

Job Viewed

Tap Again To Close

Job Description

Description
ICF is a mission-driven company filled with people who care deeply about improving the lives of others and making the world a better place. Our cybersecurity experts work to protect the functions and missions that are vital to our people, government, and military through proactive planning and strong public-private partnerships.
We're currently hiring a **Cyber Threat Analyst** **SME** to support a federal cybersecurity client as part of our team helping to secure and protect the Nation's critical infrastructure resilience. This role will provide technical and analytical insights into information related to cyber incidents, vulnerabilities, and threat actor activity.
In-person work will be conducted on the client site in Arlington, VA. Candidates must be located in the National Capital Region.
**Key Responsibilities:**
+ Assess threat and vulnerability information shared by partners for potential impact to federal agency systems and critical infrastructure
+ Determine validity and impact of threat information, provide analysis, and collaborate to determine necessary partner notifications and potential product development
+ Coordinate with internal and external stakeholders to facilitate timely and informed cyber incident response activities
+ Monitor inboxes and other real-time communication channels for partner communications, respond to cyber partner inquiries, coordinate cybersecurity products (alerts, advisories, etc.) among targeted partners for technical before public distribution
+ Apply knowledge of evolving cyber threat landscape, emerging threats, and geopolitical events and trends to enhance the organization's operational mission
**What you will need:**
+ 5+ years of related professional experience
+ U.S. Citizenship required (required by federal government for position)
+ Active **SCI** security clearance required
**Preferred Skills/Experience:**
+ Bachelor's degree in a relevant field
+ Industry standard certifications are a plus (CompTIA Sec+, CEH, etc.).
+ Cyber operations, analysis, and/or incident management response experience
**Additional Qualifications:**
+ Ability to apply knowledge of cybersecurity concepts, policies, and procedures in a high-paced operational environment
+ Excellent communications skills, both written and verbal, and ability to brief senior-level clients on operational activity
+ Customer service orientation with strong leadership, interpersonal, organizational, problem-solving, and strategic thinking skills
+ Proficiency with open-source and commercial threat intelligence tools
+ Industry standard certifications are a plus
#LI-CC1
#indeed
**Working at ICF**
ICF is a global advisory and technology services provider, but we're not your typical consultants. We combine unmatched expertise with cutting-edge technology to help clients solve their most complex challenges, navigate change, and shape the future.
We can only solve the world's toughest challenges by building a workplace that allows everyone to thrive. We are an equal opportunity employer. Together, our employees are empowered to share their expertise and collaborate with others to achieve personal and professional goals. For more information, please read our EEO ( policy.
We will consider for employment qualified applicants with arrest and conviction records.
Reasonable Accommodations are available, including, but not limited to, for disabled veterans, individuals with disabilities, and individuals with sincerely held religious beliefs, in all phases of the application and employment process. To request an accommodation, please email   and we will be happy to assist. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. 
Read more about  workplace discrimination righ t s or our benefit offerings which are included in the  Transparency in (Benefits) Coverage Act.
**Candidate AI Usage Policy**
At ICF, we are committed to ensuring a fair interview process for all candidates based on their own skills and knowledge. As part of this commitment, the use of artificial intelligence (AI) tools to generate or assist with responses during interviews (whether in-person or virtual) is not permitted. This policy is in place to maintain the integrity and authenticity of the interview process. 
However, we understand that some candidates may require accommodation that involves the use of AI. If such an accommodation is needed, candidates are instructed to contact us in advance at  . We are dedicated to providing the necessary support to ensure that all candidates have an equal opportunity to succeed.  
**Pay Range** - There are multiple factors that are considered in determining final pay for a position, including, but not limited to, relevant work experience, skills, certifications and competencies that align to the specified role, geographic location, education and certifications as well as contract provisions regarding labor categories that are specific to the position.
The pay range for this position based on full-time employment is:
$107,936.00 - $183,491.00
Virginia Client Office (VA88)
View Now

Cyber Threat Analyst

20151 Chantilly, Virginia CACI International

Posted 16 days ago

Job Viewed

Tap Again To Close

Job Description

Cyber Threat Analyst
Job Category: Engineering
Time Type: Full time
Minimum Clearance Required to Start: TS/SCI with Polygraph
Employee Type: Regular
Percentage of Travel Required:
Type of Travel: Local
* * *
**The Opportunity:**
**If chosen, YOU will get to work with an agile, fast paced team focused on defending our client's global networks through threat hunting and tactical analysis of ongoing attacks. In this role, you will challenged to dig into various platforms to discover data anomalies. This person should have a wide range knowledge and skills, such as computer forensics/mobile device forensics, data recovery, reverse engineering intrusion analysis and methodologies, intelligence analysis, and vulnerability assessments. If chosen, YOU will have the opportunity to work on highly visible projects that directly make an impact to the Nations mission. YOU will be a motivated, passionate leader with the ability to drive our long-term strategic goals with daily tactical objectives. YOU will be a critical component in taking complex problems and delivering solutions that are simple yet elegant.**
**Responsibilities:**
**Use GOTS, commercial, and/or open source data exploitation and visualization tools for analysis, preferably broad in scope.**
**Analyze data sets (both small and large) for trends and patterns.**
**Produce informational, contextual, and/or intelligence products that embody and explain findings for a variety of audiences.**
**Script and/or programming experience (e.g. Python, Bash, R, Spark, C#, Java.)**
**Work with intrusion sets TTPs and the ability to apply knowledge to future analysis.**
**Work with social media platforms.**
**Be part of a department with an expanding range of programs focusing on Cyber Operations, where you get to grow on and between programs with peers who are dedicated to advancing national security. Participate in fun team outings and team building events where you get to engage with your co-workers and expand your career network. We are a fun, engaging environment with a management team focused on growing your career and making you a part of our future. We offer bonus compensation plans that demonstrate you being appreciated for working on the program and being a part of our team. You'll get paid for cyber events and training, such as our Capture the Flag Events, Internal Research and Development opportunities as well as prepaid courses to nationally recognized certification courses to grow your career. To learn more, you can visit our program's landing page: VORPAL Jobs ( .**
**Qualifications:**
**_Required:_**
**Active TS/SCI with required polygraph clearance.**
**Bachelors degree.**
**Minimum of 7 years of experience in technical analysis, digital forensics, technical targeting, or similar relevant technical experience.**
**Fundamental understanding of networking, with basic knowledge of Linux and Windows operating systems**
**Comfortable with Windows and Linux command line tools (PowerShell)**
**Proficient in data exploitation and data analysis.**
**Proficient in analyzing log files from web hosting services and other technical infrastructure.**
**Proficient in analyzing and exploiting RAW PCAP collections.**
**Ability to articulate technical information to non-technical audiences.**
**Strong analytical and critical thinking skills, ability to think strategically.**
**Ability to express complex ideas and insights verbally and in writing to a variety of audiences.**
**Ability to remain open minded and change opinions based on new information and requirements.**
**Ability to pay attention to details, ensuring accuracy in documentation.**
**Knowledge of IT defensive best practices.**
**Demonstrated experience employing visualization tools to display network graphs, workflows using COTS products or custom scripts**
This position is contingent on funding and may not be filled immediately. However, this position is representative of positions within CACI that are consistently available. Individuals who apply may also be considered for other positions at CACI.
**___**
**What You Can Expect:**
**A culture of integrity.**
At CACI, we place character and innovation at the center of everything we do. As a valued team member, you'll be part of a high-performing group dedicated to our customer's missions and driven by a higher purpose - to ensure the safety of our nation.
**An environment of trust.**
CACI values the unique contributions that every employee brings to our company and our customers - every day. You'll have the autonomy to take the time you need through a unique flexible time off benefit and have access to robust learning resources to make your ambitions a reality.
**A focus on continuous growth.**
Together, we will advance our nation's most critical missions, build on our lengthy track record of business success, and find opportunities to break new ground - in your career and in our legacy.
**Your potential is limitless.** So is ours.
Learn more about CACI here. ( Range** : There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here ( .
The proposed salary range for this position is:
$113,200 - $237,800
_CACI is_ _an Equal Opportunity Employer._ _All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, age, national origin, disability, status as a protected veteran, or any_ _other protected characteristic._
View Now

Cybersecurity Threat Analyst

94103 San Francisco, California $115000 Annually WhatJobs

Posted today

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a highly skilled and analytical Cybersecurity Threat Analyst to join their cutting-edge security operations center. This is a fully remote position, allowing top talent to contribute from anywhere in the US. The Cybersecurity Threat Analyst will be instrumental in identifying, analyzing, and mitigating advanced cyber threats targeting our client's organization. You will be responsible for monitoring threat intelligence feeds, conducting deep-dive analyses of security incidents, and developing proactive defense strategies. This role requires a forward-thinking mindset and a comprehensive understanding of the ever-evolving threat landscape.

Key Responsibilities:
  • Monitor and analyze global threat intelligence feeds, industry reports, and security alerts to identify potential risks and emerging threats.
  • Investigate and analyze security incidents, including malware analysis, forensic investigations, and root cause analysis.
  • Develop and refine threat detection rules and signatures for SIEM, IDS/IPS, and other security tools.
  • Conduct proactive threat hunting activities to uncover hidden threats within the network environment.
  • Create detailed reports on threat trends, vulnerabilities, and incident findings for technical and executive audiences.
  • Collaborate with incident response teams to effectively contain, eradicate, and recover from security breaches.
  • Develop and maintain documentation for threat intelligence processes, methodologies, and playbooks.
  • Assess the impact of new threats on the organization's infrastructure and provide mitigation recommendations.
  • Stay abreast of the latest attack vectors, malware, and adversarial tactics, techniques, and procedures (TTPs).
  • Evaluate and recommend new security tools and technologies to enhance threat detection and analysis capabilities.
  • Participate in security awareness initiatives and share threat intelligence across the organization.
  • Contribute to the continuous improvement of the Security Operations Center (SOC) capabilities.
  • Build and maintain relationships with external threat intelligence communities and law enforcement agencies.

Qualifications:
  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field. Master's degree is a plus.
  • Minimum of 5-7 years of experience in cybersecurity, threat intelligence, incident response, or security analysis.
  • Proven experience with SIEM platforms (e.g., Splunk, QRadar, ArcSight) and endpoint detection and response (EDR) tools.
  • Strong understanding of networking protocols, operating systems, and common attack methodologies.
  • Experience with malware analysis techniques and tools.
  • Familiarity with threat intelligence platforms (TIPs) and frameworks like MITRE ATT&CK.
  • Relevant cybersecurity certifications such as GIAC, CISSP, or Security+ are highly desirable.
  • Excellent analytical, critical thinking, and problem-solving skills.
  • Strong written and verbal communication skills, with the ability to present complex information clearly.
  • Ability to work independently and collaboratively in a remote team environment.
  • Proficiency in scripting languages (e.g., Python, PowerShell) for automation is a plus.
This fully remote role offers a compelling opportunity for a seasoned threat analyst to join a leading organization and make a significant impact on its cybersecurity posture from anywhere in the US.
Apply Now
Be The First To Know

About the latest Threat analyst Jobs in United States !

Cybersecurity Threat Analyst

23451 Virginia Beach, Virginia $98000 Annually WhatJobs

Posted 7 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client, a growing technology firm in the vital cybersecurity sector, is seeking a proactive and analytical Cybersecurity Threat Analyst to join their team in Virginia Beach, Virginia, US . This role is essential for identifying, analyzing, and responding to emerging cyber threats, thereby protecting the organization's digital assets and sensitive information. You will be responsible for monitoring security alerts, investigating potential security incidents, and conducting threat intelligence gathering to understand and predict adversary tactics, techniques, and procedures (TTPs). The ideal candidate will possess a strong understanding of cybersecurity principles, network protocols, operating systems, and common attack vectors. Experience with security information and event management (SIEM) tools, intrusion detection/prevention systems (IDS/IPS), and endpoint detection and response (EDR) solutions is highly desirable. Responsibilities include developing threat hunting hypotheses, analyzing malware, correlating security events, and producing detailed reports on threat landscapes and incident findings. This hybrid role allows for a balance of on-site collaboration in our Virginia Beach, Virginia, US office and remote work flexibility for in-depth analysis and research. You will work closely with security operations center (SOC) analysts, incident response teams, and IT infrastructure personnel. A passion for staying ahead of evolving threats and a commitment to continuous learning are paramount. If you are a driven cybersecurity professional looking to make a significant impact in threat analysis and prevention within a dynamic environment, we encourage you to apply.
Apply Now

Cybersecurity Threat Analyst

83702 Hidden Springs, Idaho $85000 Annually WhatJobs

Posted 7 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a vigilant and analytical Cybersecurity Threat Analyst to join their growing security team in Boise, Idaho, US . This role is crucial for proactively identifying, assessing, and mitigating cyber threats to protect the organization's digital assets and sensitive data. The Cybersecurity Threat Analyst will be responsible for monitoring security alerts, analyzing threat intelligence, investigating security incidents, and recommending appropriate countermeasures. You will work with a variety of security tools, including SIEM, IDS/IPS, EDR, and threat intelligence platforms, to detect and respond to potential security breaches. Key responsibilities include researching emerging threats, vulnerabilities, and attack vectors, developing and maintaining threat detection rules, and contributing to incident response planning and execution. The ideal candidate possesses a strong understanding of network security, operating systems, common attack methodologies, and cybersecurity frameworks. Excellent analytical skills, meticulous attention to detail, and the ability to interpret complex data are essential. You will collaborate with IT and security teams to implement security controls and enhance the overall security posture of the organization. A passion for cybersecurity, a proactive mindset, and a commitment to continuous learning are highly valued. This is an excellent opportunity for a cybersecurity professional looking to contribute to a critical function and grow their expertise in a challenging environment.
Responsibilities:
  • Monitor security systems and analyze alerts for potential threats.
  • Investigate security incidents and perform forensic analysis.
  • Research and analyze threat intelligence from various sources.
  • Develop and tune detection rules for SIEM and other security tools.
  • Respond to security incidents and coordinate mitigation efforts.
  • Collaborate with IT teams to implement security best practices and controls.
  • Document security incidents, findings, and recommendations.
  • Stay current with the latest cybersecurity threats and trends.
Qualifications:
  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
  • 3+ years of experience in cybersecurity, security operations, or threat analysis.
  • Proficiency with SIEM tools (e.g., Splunk, QRadar), IDS/IPS, and EDR solutions.
  • Strong understanding of networking protocols, operating systems (Windows, Linux), and common attack vectors.
  • Experience with threat intelligence platforms and vulnerability assessment tools.
  • Excellent analytical and problem-solving skills.
  • Strong written and verbal communication skills.
  • Relevant cybersecurity certifications (e.g., Security+, CySA+, GCIH) are a plus.
Apply Now

Cybersecurity Threat Analyst

19102 William Penn Annex West, Pennsylvania $105000 Annually WhatJobs

Posted 7 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client, a leading provider of advanced security solutions, is seeking a skilled Cybersecurity Threat Analyst to join their dynamic team in Philadelphia, Pennsylvania, US . This role is critical in identifying, analyzing, and mitigating cyber threats to protect the organization's digital assets. You will be responsible for monitoring security systems, investigating incidents, and developing proactive defense strategies. The ideal candidate possesses a strong understanding of threat landscapes, advanced analytical skills, and a passion for staying ahead of evolving cyber risks. This position offers a hybrid work model, allowing for a blend of in-office and remote work.

Responsibilities:
  • Monitor security alerts and logs from various sources, including SIEM, IDS/IPS, and firewalls.
  • Analyze threat intelligence data to identify emerging attack vectors and vulnerabilities.
  • Investigate security incidents, perform root cause analysis, and recommend remediation steps.
  • Develop and implement threat hunting methodologies to proactively uncover malicious activity.
  • Create detailed reports on threat trends, incident findings, and security posture.
  • Collaborate with incident response teams to contain and eradicate threats.
  • Stay current with the latest cybersecurity threats, vulnerabilities, and mitigation techniques.
  • Develop and refine detection rules and signatures for security tools.
  • Participate in tabletop exercises and simulations to test incident response plans.
  • Provide security awareness training and guidance to other teams.
  • Contribute to the continuous improvement of the security operations center (SOC) capabilities.
  • Maintain documentation of security procedures and protocols.
Qualifications:
  • Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
  • Minimum of 3 years of experience in cybersecurity, threat analysis, or incident response.
  • Strong understanding of networking protocols, operating systems, and common attack methodologies.
  • Proficiency with security tools such as SIEM (e.g., Splunk, QRadar), IDS/IPS, and endpoint detection and response (EDR).
  • Experience with threat intelligence platforms and data analysis.
  • Excellent analytical, problem-solving, and critical thinking skills.
  • Strong written and verbal communication skills.
  • Ability to work effectively in a fast-paced, high-pressure environment.
  • Relevant certifications such as CompTIA Security+, CEH, or GIAC are a plus.
  • Ability to work effectively within a hybrid team structure, with presence required in Philadelphia, Pennsylvania, US as needed.
  • A proactive mindset and a dedication to protecting critical information assets.
This role offers an exciting opportunity to work on the front lines of cybersecurity, protecting an organization from sophisticated threats. If you are a detail-oriented and driven cybersecurity professional, we encourage you to apply.
Apply Now

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Threat Analyst Jobs