For immediate consideration, please email firstname.lastname@example.org with the most updated version of your resume.
Active TS/SCI Clearance required.
Mastery of methods, sources, tools, and subject-matter pertaining to all-source cyber threat intelligence collection and analysis.
Ability to analyze, produce, and disseminate analytical cyber threat products that assist in identifying threats, priorities, severities, and IA risk mitigation measures.
Advanced technical skills proficiency in one or more of the following areas: IP network communication, DNS records, basic system administration, and/or understanding of computer network defense operations (SIEM, proxy, firewall, IDS/IPS, router/switch, vulnerability management, and/or HBSS).
Able to engage with cyber intelligence analyst counterparts across the DoD.
Expert level knowledge of adversary activities in cyberspace with an understanding of intrusion set tactics, techniques, and procedures (TTP).
Analyze technical data to identify and extract attacker TTPs, identify unique malware attributes, and pivot to related activity or information that could support defensive mitigation and hardening efforts.
Produce and disseminate all-source integrated intelligence analysis to support customer and defensive cyberspace operations planning, integration, coordination, and execution with Law Enforcement/Counterintelligence, allied/coalition, and open-source information to assess potential impacts to the military network.
Bachelor Degree in Information Technology
IAT II certifications: CompTIA Security+, GSEC, SCNP, SSCP or higher
MCSA Windows or Server Infrastructure or obtain within 5 months
CEH (Certified Ethical Hacker)
Ability to deploy to Southwest Asian Theater - two month period of time, once every two years
Formal training as an intelligence analyst or officer – graduate of US Govt or Existing Subject Matter Expert of Advanced Persistent Threat activity.
Conducting Indications and Warning (I&W) analysis to proactively identify potential threats against DoD, US Gov, and US Allied networks.
Maintaining cognizance of overall LE/CI trends, analysis and operations related to computer network defense within the DoD and national level communities.
Ability to collect, authenticate, validate and document online evidence.
Technical Skills proficiency in encryption technologies/standards, basic malware analysis, digital computer forensics experience, and perform computer Security Incident Response activities.
Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
Research relational databases to formulate appropriate queries, conduct data mining, and to analyze collected network data.
Apex is an Equal Employment Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other characteristic protected by law. Apex will consider qualified applicants with criminal histories in a manner consistent with the requirements of applicable law. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation in using our website for a search or application, please contact our Employee Services Department at 844-463-6178