Senior Cyber Threat Intelligence Lead
The U.S. Department of Homeland Security (DHS), Federal Emergency Management Agency (FEMA) Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to FEMA networks and its regions through monitoring, intrusion detection and protective security services to FEMA information systems including local area networks/wide area networks (LAN/WAN), commercial internet connection, public facing websites, wireless, mobile/cellular, various cloud environments, security devices, servers and workstations. The FEMA SOC is responsible for the overall security of FEMA Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations.
We are seeking a highly experienced Senior Cyber Threat Intelligence Lead to establish and lead enterprise-wide cyber threat intelligence operations. This role will be responsible for producing high-confidence intelligence products, leading CTI coordination for FEMA with DHS and other agencies, supporting the SOC and engineering teams and driving strategic intelligence priorities in support of FEMA's mission.
Primary responsibilities include:
- Leading FMI's CTI program, developing and maintaining CTI CONOPS, SOPs, prioritizing tailored intelligence collection and dissemination across FEMA and its regions.
- Conducting cyber threat analysis, identifying mitigation and/or remediation courses of action; developing actionable intelligence used to protect organizational IT assets; and trending cyber threat metrics for leadership situational awareness.
- Maintaining a comprehensive understanding of the cyber threat landscape, including identifying and analyzing cyber threats actors and/or activities to enhance cybersecurity posture of the organization's IT operating environment.
- Identifying, tracking and investigating, and writing technical products for dissemination to stakeholders regarding high priority threat campaigns, malicious actors, APTs, emerging threats, etc.
- Providing expert threat analysis to the Security Operations Center during incident response and threat intelligence activities that includes cyber threat analysis support, research, recommending relevant remediation and mitigation.
- Conducting trending and correlation of various cyber intelligence sources for the purposes of indicator collection, shifts in TTPs, attribution and establishing countermeasures to increase cyber resiliency.
- Overseeing and mentoring team of CTI analysts.
- Collaborating with federal, state, and local CTI stakeholders to ensure actionable information sharing and situational awareness.
- Proficient in one or more of the following computer languages Python, Bash, Visual Basic or PowerShell in order to support cyber threat detection or reporting.
Responsibilities also include:
- Producing high quality technical and non-technical products, briefings, whitepapers, etc., with minimal supervision and emphasis on effective/accurate reporting on product topics.
- Maintaining situational awareness of emerging threats, zero days, vulnerabilities and other threats against customer systems, networks, and assets.
- Processing technical data from various sources and fusing the data with intelligence reporting to improve the security posture of the customer, as well as managing threat intelligence tools security tools such as Analyst1 and Silobreaker.
- Collaborating with federal, state, and local CTI stakeholders to ensure actionable information sharing and situational awareness.
Basic qualifications include:
- Top Secret Clearance Eligibility with the ability to obtain a TS/SCI. In addition to clearance requirement, all FEMA personnel must have a current or be able to favorably pass a FEMA EOD.
- BS in IT related field or higher and 8-12 years' experience in an information technology field with a minimum of 5 years of experience as a Tier II senior cyber security analyst performing intelligence analysis, collection management, and technical analysis.
- 5+ years of recent experience with host-based and network-based security monitoring solutions and to include security content recommendation or development (host based and network signatures).
- 2 years recent experience with host-based and network-based security monitoring using cybersecurity capabilities.
- Experience developing scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML or other.
- Ability to work independently with minimal direction; self-starter/self-motivated.
- Experienced utilizing CTI platforms.
- Strong communication skills and experience briefing to technical and executive audiences.
- Strong understanding of MITRE ATT&CK, cyber kill chain, Diamond Model, threat modeling and TTP tracking.
Required certifications:
- The candidate should have at minimum ONE of the following certifications:
- Certified Information System Security Professional (CISSP).
- SANS - GCIA – Intrusion Analyst
- SANS - GREM – Reverse Engineering Malware
- SANS - GISF – Security Fundamentals
- SANS - GXPN – Exploit Researcher and Advanced Penetration Tester
- SANS - GMON – Continuous Monitoring Certification
- OSCP (Certified Professional)
- OSCE (Certified Expert)
- OSWP (Wireless Professional)
- OSEE (Exploitation Expert)
- CCSP – Certified Cloud Security Professional
- LPT – Licensed Penetration Tester
- ECSA – EC-Council Certified Security Analyst
- Cyber Analyst Course
Preferred qualifications include:
- A minimum of five (5) years of hands-on experience with experience in the last two (2) years that includes host-based and network based security monitoring using cybersecurity capabilities.
- Previous DOD, IC or Law Enforcement Intelligence or Counter Intelligence Training/Experience.
- Knowledge of Structured Analytic Techniques.
- Degree in Applied Intelligence or Advanced Degree in Cyber Security or related field.
- Understanding of threats to OT and Infrastructure.
- Experience building and maturing a CTI team.
- Experience performing threat hunting.
- Experience conducting attribution assessments of nation-sate and criminal threat actors.
Clearance: Top Secret