Cipher Tech Solutions
  • 11-Oct-2017 to 10-Jan-2018 (EST)
  • Cyber Intel
  • Linthicum, MD, USA
  • Hourly
  • Full Time

Location

Linthicum, MD

Description 

Candidates will be focused on analysis and reporting of cyber intelligence, writing tactical and operational cyber threat reports. Candidates must be have a strong background tracking APT activity and be able to marry traditional intelligence analysis with current cyber focus. 

Requirements

Must be a US Citizen with a TOP SECRET security clearance (no exceptions) *TS/SCI preferred

Must hold a BS degree in Information Security, Computer Science, Cyber Security, Intelligence Studies, Applied Intelligence, Regional Studies, International Affairs, Political Science & Analysis or another related field of study.

2+ years of experience tracking and classifying APT groups

Comprehensive understanding of TTPs and indicators of compromise

Experience writing reports, using multi-source intelligence and narrative analysis that lead to evidence-based conclusions

Ability to brief small audiences up to the executive level

Must be current with knowledge regarding the cyber threat landscape at classified and unclassified levels

Desirable

Experience supporting network defenders and preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

Certifications such as CISSP, GCIH, Network+, Security+, etc and/or direct study

Formal training in intelligence analysis techniques

About Us

At Cipher Tech Solutions, Inc. (Cipher Tech), we take great pride in supporting some of the most mission critical work in the Department of Defense and the Intelligence Community. The majority of our company is comprised of extremely talented software developers who write production tools which directly support one of two missions: digital forensics and malware reverse engineering.

Digital forensics is the practice of extracting and processing evidence from computers, phones, tablets, cameras, flash-drives, and just about any other form of digital media. The results of our work are then used to support federal and military law enforcement, counter intelligence, and counter terrorist activities.

Malware reverse engineering is the practice of analyzing extremely advanced malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as:

How did it infect the victim's computer

What kind of information it is seeking to steal

How is it communicating with the author (actor)

Who that actor might be

 

Cipher Tech Solutions
  • Apply Now

  • * Fields Are Required

    What is your full name?

    How can we contact you?

    By clicking the button above, I agree to ApplicantPro's Applicant Information Use Policy.

  • Sign Up For Job Alerts!

  • Share this Page
  • Facebook Twitter LinkedIn Email
.
Logo Home The Company Services&Solutions Careers Contact Us