2025-08-19
Leidos
Other
/yr
full-time
part-time
employee
contract
Bluemont
Virginia
20135
United States
Description
The U.S. Department of Homeland Security (DHS), Federal Emergency Management Agency (FEMA) Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to FEMA networks and its regions through monitoring, intrusion detection and protective security services to FEMA information systems including local area networks/wide area networks (LAN/WAN), commercial internet connection, public facing websites, wireless, mobile/cellular, various cloud environments, security devices, servers and workstations. The FEMA SOC is responsible for the overall security of FEMA Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations.
We are seeking a highly experienced Senior Cyber Threat Intelligence Lead to establish and lead enterprise-wide cyber threat intelligence operations. This role will be responsible for producing high-confidence intelligence products, leading CTI coordination for FEMA with DHS and other agencies, supporting the SOC and engineering teams and driving strategic intelligence priorities in support of FEMA’s mission.
Primary Responsibilities:
Lead FMI’s CTI program, develop and maintain CTI CONOPS, SOPs, prioritizing tailored intelligence collection and dissemination across FEMA and it’s regions.
Will conduct cyber threat analysis, identifying mitigation and/or remediation courses of action; developing actionable intelligence used to protect organizational IT assets; and trending cyber threat metrics for leadership situational awareness.
Responsible for maintaining a comprehensive understanding of the cyber threat landscape, including identifying and analyzing cyber threats actors and/or activities to enhance cybersecurity posture of an the organization’s IT operating environment.
Identify, track and investigate, and write technical products for dissemination to stakeholders regarding high priority threat campaigns, malicious actors, APTs, emerging threats, etc.
Bring a comprehensive understanding, analyzing and tracking the cyber threat landscape, including identifying and analyzing cyber threats actors, APT TTPs and/or activities to enhance cybersecurity posture of the organization’s IT operating environment.
Provide expert threat analysis to the Security Operations Center during incident response and threat intelligence activities that includes cyber threat analysis support, research, recommending relevant remediation and mitigation.
Conduct trending and correlation of various cyber intelligence sources for the purposes of indicator collection, shifts in TTPs, attribution and establishing countermeasures to increase cyber resiliency
Oversee and mentor team of CTI analysts
Collaborate with federal, state, and local CTI stakeholders to ensure actionable information sharing and situational awareness
Proficient in one more of the following computer languages Python, Bash, Visual Basic or PowerShell in order to support cyber threat detection or reporting.
Will be responsible for:
Producing high quality technical and non-technical products, briefings, whitepapers, etc., with minimal supervision and emphasis on effective/accurate reporting on product topics.
Maintain situational awareness of emerging threats, zero days, vulnerabilities and other threats against customer systems, networks, and assets.
Process technical data from various sources and fuse the data with intelligence reporting to improve the security posture of the customer, as well as manage Threat Intelligence tools security tools such as Analyst1 and Silobreaker.
Collaborate with federal, state, and local CTI stakeholders to ensure actionable information sharing and situational awareness
Basic Qualifications:
The candidate must currently possess a Top Secret Clearance Eligibility with the ability to obtain a TS/SCI. In addition to clearance requirement, all FEMA personnel must have a current or be able to favorably pass a FEMA EOD
BS in IT related field or higher and 8-12 years’ experience in an information technology field with a minimum of 5 years of experience as a Tier II senior cyber security analyst performing intelligence analysis, collection management, and technical analysis.
5+ years of recent experience with host-based and network-based security monitoring solutions and to include security content recommendation or development (host based and network signatures).
2 years recent experience with host-based and network-based security monitoring using cybersecurity capabilities.
Must be experienced developing scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML or other.
Ability to work independently with minimal direction; self-starter/self-motivated
Experienced utilizing CTI platforms
Strong communication skills and experience briefing to technical and executive audiences
Strong understanding of MITRE ATT&CK, cyber kill chain, Diamond Model, threat modeling and TTP tracking.
Required certifications:
The candidate should have at minimum ONE of the following certifications:
Certified Information System Security Professional (CISSP).
SANS - GCIA – Intrusion Analyst
SANS - GREM – Reverse Engineering Malware
SANS - GISF – Security Fundamentals
SANS - GXPN – Exploit Researcher and Advanced Penetration Tester
SANS - GMON – Continuous Monitoring Certification
OSCP (Certified Professional)
OSCE (Certified Expert)
OSWP (Wireless Professional)
OSEE (Exploitation Expert)
CCSP – Certified Cloud Security Professional
LPT – Licensed Penetration Tester
ECSA – EC-Council Certified Security Analyst
Cyber Analyst Couse
Preferred Qualifications:
A minimum of five (5) years of hands-on experience with experience in the last two (2) years that includes host-based and network based security monitoring using cybersecurity capabilities.
Previous DOD, IC or Law Enforcement Intelligence or Counter Intelligence Training/Experience
Knowledge of Structured Analytic Techniques
Degree in Applied Intelligence or Advanced Degree in Cyber Security or related field.
Understanding of threats to OT and Infrastructure
Experience building and maturing a CTI team
Experience performing threat hunting
Experience conducting attribution assessments of nation-sate and criminal threat actors
Clearance: Top Secret
Come break things (in a good way). Then build them smarter.
We're the tech company everyone calls when things get weird. We don’t wear capes (they’re a safety hazard), but we do solve high-stakes problems with code, caffeine, and a healthy disregard for “how it’s always been done.”
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
#Remote