Senior Cyber Threat Intel & Detection in Takoma Park, MD at Eliassen Group

Date Posted: 11/5/2020

Job Snapshot

  • Employee Type:
    Contract to Hire
  • Job Type:
  • Experience:
    Not Specified
  • Date Posted:

Job Description

We have an exciting opportunity for a Senior Cyber Threat Intel & Detection with our industry-leading client in Rockville, MD.

Due to client requirement, applicants must be willing and able to work on a w2 basis. For our w2 consultants, we offer a great benefits package that includes Medical, Dental, and Vision benefits, 401k with company matching, and life insurance.


  • Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities; Provide subject matter expertise to the development of cyber operations specific indicators; Maintain a common intelligence picture.
  • Brief threat related current situations. Collaborate with intelligence Engineers/targeting organizations involved in related areas. Conduct in-depth research and analysis. Conduct nodal analysis. Develop information requirements necessary for answering priority information requests. Evaluate threat decision-making processes.
  • Identify threat tactics, and methodologies. Identify intelligence gaps and shortfalls. Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets.
  • Monitor and report on validated threat activities. Monitor open source websites for hostile content directed towards organizational or partner interests.
  • Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements.
  • Produce timely indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies)
  • Provide SME and support to planning/developmental forums and working groups as appropriate.
  • Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations.
  • Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations.
  • Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities.
  • Report intelligence-derived significant network events and intrusions.
  • Work closely with planners, intelligence Engineers, and collection managers to ensure intelligence requirements and collection plans are accurate and up-to-date.
  • Conduct digital forensic analysis through email forensics, registry analysis, user forensic analysis, artifact analysis, log analysis, timeline analysis, file system analysis, malware analysis Job Requirements


  • Minimum 5 years’ experience in at least 3 of the following:
  • Coordinating, validating, and\or managing of all-source collection requirements
  • Identifying threats and vulnerabilities, Log correlation from various sources
  • Briefing senior management and security operations center
  • Conducting in-depth research and analysis (structured/gap/nodal) on threats and intelligence
  • Serving as a technical expert and liaison to explain incident details
  • Risk management processes (e.g., methods for assessing, mitigating and accepting risks).
  • Cybersecurity principles, security models, organizational requirements (w.r.t. confidentiality, integrity, availability, authentication, non-repudiation), cyber threats, risks and vulnerabilities, cryptography and cryptographic key management concepts, host/network access control mechanisms (e.g., ACLs), network access, identity, & access management (e.g., PKIs), Computer networking concepts and protocols, and network security methodologies.
  • Ethical hacking principles, general attack stages; Specific operational impacts of cybersecurity lapses; programming language structures and logic.
  • Basic system administration, network, and operating system hardening techniques
  • Able to communicate, verbally and in writing, complex-technical issues with simplicity & clarity
  • Able to exercise discretion and maintain confidentiality
  • Proficient in reporting and answering analytical questions using vulnerability data
  • BA or BS degree in Computer Science\Security or related discipline (Masters preferred)
  • Industry standards such as GCIH or related GIAC (preferred but not required)
  • Preferred experience in policy and procedure development, report writing and presentations

Job ID: 346428

About Eliassen Group:

Eliassen Group provides strategic talent solutions to drive our clients’ innovation and business results. Leveraging over 30 years of success, our expertise in IT staffing, Agile consulting, creative services, managed services, and life sciences enables us to partner with our clients to execute their business strategy and scale effectively. Headquartered in Reading, MA and with offices from coast to coast, Eliassen Group offers local community presence, deep networks, as well as national reach. For more information, visit

Eliassen Group is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.

Don’t miss out on our referral program! If we hire a candidate that you refer us to then you can be eligible for a $1,000 referral check!