full-time employee contract
Entering ManTech’s 50th year, we hold the distinct honor of being named a “Top 100 Global Technology Company” by Thomson Reuters. We have earned this and many other accolades over the years for our dedication to serving the missions of our nation’s most important customers: U.S. Intelligence, Defense and Federal Civilian agencies. All know us as a trusted partner offering best-in-class solutions in cyber, data collection & analytics, enterprise IT, and systems and software engineering tailored to meet their specific requirements.
Become an integral part of a diverse team in the Mission, Cyber and Intelligence Solutions (MCIS) Group. Currently, ManTech is seeking a motivated, mission oriented Cyber Threat Analyst in Washington DC area, with strong Customer relationships. At ManTech, you will help protect our national security while working on innovative projects that offer opportunities for advancement.
The FSS Division provides cyber solutions to a wide range of Defense and Intelligence Community customers. This division consists of a team of technical leaders that deliver advanced technical solutions to government organizations. Our customers have high standards, are technically adept, and use our products daily to support their mission of protecting national security. Our contributions to our customer’s success is driving our growth.
As an CTA, you will monitor and analyze network traffic, IDS alerts, network and system logs, and available open source information to detect and report threats to customer networks. You will perform CSIRT/SOC operations to include IDS event monitoring and analysis, security incident handling, incident reporting, and threat analysis. To be successful in this role you should be familiar with common Intrusion Detection Systems, virus and malware behavior, and intrusion methodologies. You will also be responsible for determining appropriate response action(s) required to mitigate risk and provide threat and damage assessment for security threats which may impact the customer networks.
In this role you will also be responsible for the analysis and reporting of cyber threats as well as assist in deterring, identifying, monitoring, investigating and analyzing computer network intrusions. You will also provide periodic written updates documenting the results of this analysis. In this role, you will be required to provide analysis of threat intelligence data and log files to recover malicious activity, indicators, signatures, commands/passwords; as well as identify software programs used, identify communication recipients, and identify number of users on victim systems. You will also then provide written periodic updates and advisories documenting the results of this analysis.
You will also be responsible for documenting and correlating digital information, such as, threat data (Victim/Source Internet Protocol (IP) addresses, Uniform Resource Locators (URL), malicious software), actor contacts or personal data, system logs, obtained from single or multiple sources and develop correlation associations. In this role, you will be required to analyze cyber intrusion activities and make recommendations for the customer to collect, monitor, counteract, or mitigate the threat. As well as analyze leading-edge technologies and make recommendations on analytical procedures for customer to address cyber threats and vulnerabilities targeting U.S. national interests. Good interpersonal, organizational, writing, communications and briefing skills. Experience with Splunk, Cylance, Anomali Threat Stream or equivalent is preferred, but not necessary.
Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information. Secret Clearance may be required in the future.