Cyber Threat Analyst Manager with Security Position

Cyber Threat Analyst Manager with Security Position Opeing

Manager, Cyber Threat & Analysis will provide day-to-day leadership and guidance to a cross functional team that provides cyber threat analysis in support of a large Government program. This position supports multiple programs in providing architecture and systems engineering support to mitigate cyber intrusions onto CenturyLink’s ISP network in support of US Government networks. This position is a highly technical and hands-on position requiring the selected candidate to both lead and participate in multiple team environments and to provide independent efforts to all aspects of system integration including design, needs analysis, design review, testing, implementation, and validation. The position will require briefing senior government officials on the status of CenturyLink Government’s ISP and cyber security capabilities. The position is responsible for all aspects of the development, implementation and oversight for the discovery, analysis and monitoring aspect of the program. This role will lead a team of cross functional analysts and security engineers and be responsible for the analytic outputs of the program (e.g. intel reporting, focused operations, etc.). The leadership position will directly interface with the agencies within the program and provide a watch lead function to ensure that reporting and communication is consistent and actionable for the customer. Primary responsibilities include personnel and task supervision, task estimating and planning, and individual development activities.

Management Requirements

  • Bachelor degree in a related field or equivalent work experience in the software engineering, network engineering, and/or cyber security fields
  • Leading development teams with a strong preference for experience leading teams located in multiple geographic regions and time zones
  • Scoping development activities, specifically evaluating requirements to determine release scope, schedule, and resource allocations
  • Execute development activities in accordance with established delivery plan and schedule.
  • Demonstrated ability to work in a consultative manner with others, specifically establishing rapport, interviewing/fact-finding, defining requirements, presenting options/recommending solutions, following-up, and engaging customers
  • Ability to work in a dynamic team environment with changing requirements and competing priorities
  • Ability to work cross functionally with engineers, project managers, technicians, and customers

Technical Requirements

  • Experience working in a Security operations center
  • Understanding of analytic workflows and systems
  • Detailed understanding of focused operations and criminal tactics, techniques and procedures (ttps)
  • Experience with incident response workflows and methodologies
  • Exceptional inter personal skills to lead a technical team of analysts
  • Experience in at least of the following domains:
  • Malware reverse engineering
  • Incident response
  • Cyber Threat Intelligence
  • Previous hands on experience with the following:
  • Splunk/ELK
  • Malware sandboxing
  • Intrusion detection systems
  • Endpoint technologies

Qualifications

  • 10-12 years current hands systems engineering experience
  • A Bachelor’s Degree and/or Advanced degree in Electrical/Computer Engineering or Computer Science and experience, or a strong interest in, the cyber security field.
  • Knowledge and experience should include computer network operations, network access and protection techniques and technologies, software coding, encryption and cross domain solutions
  • Available 24/7 for Network Outages and Maintenance window work.
  • Candidate must be a US Citizen with an active Department of Defense TOP SECRET clearance

group id: 10226217

Michelle writes about cyber security as well as how to protect your data online. She has worked in internet technology for over 20 years Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. She conducts workshops focused on web technologies and enjoys public speaking along with her connected rescue mutt.

Leave a Reply