Cyber Threat Specialist - Senior (TS/SCI)
Remote
Full Time
HHS CORA
Experienced
Senior Cyber Threat Analyst
cFocus Software seeks a Senior Cyber Threat Analyst supporting the Department of Health & Human Services (HHS).This position is located in Washington, DC and Atlanta, GA, with the option for remote work.
Responsibilities
- Collect, analyze, and enrich cyber threat intelligence tailored to HHS and the HPH sector
- Produce intelligence products (IOCs, technical briefs, executive summaries) and deliver regular threat reports
- Manage IOC ingestion, categorization, correlation, and real-time alerting
- Collaborate with external partners and stakeholders; brief leadership on emerging threats
- This senior-level contractor role, aligned with the GSA Labor Category (LCAT) for Cyber Threat Analyst III, is responsible for leading cybersecurity workstreams and providing in-depth threat intelligence analysis within the Department of Health and Human Services (HHS). The contractor will contribute to HHS’s Cybersecurity Operations (CSO) division, ensuring effective collection, analysis, and dissemination of actionable threat intelligence to protect HHS and its partners in the Healthcare and Public Health (HPH) sector.
- Advanced Threat Intelligence Analysis: Perform comprehensive analysis of diverse intelligence sources, including open-source cybersecurity reports, industry blogs, security forums, and public vulnerability databases. Utilize advanced threat intelligence services such as Intel 471 and Mandiant to gain insights into threats targeting HHS and the broader HPH sector. Conduct data enrichment and correlation to provide actionable intelligence.
- Threat Actor Profiling: Develop and maintain detailed profiles of cyber threat actors, including motivations, capabilities, and historical campaigns. Conduct link analysis to identify relationships between threat actors, campaigns, and infrastructure to enhance organizational defenses.
- Threat Reporting and Product Development: Develop high-quality intelligence products such as white papers, tactical notes, and threat landscape assessments. Tailor these deliverables to meet the needs of various audiences, including both technical and executive stakeholders. Contribute to legislative analysis for assessing the impact of current and upcoming regulatory measures on cybersecurity operations.
- Threat Briefings and Stakeholder Engagement: Prepare and deliver customized threat briefings to stakeholders, including technical cybersecurity teams, executive leadership, and partner organizations. Clearly communicate emerging threats, vulnerabilities, and recommended mitigations, ensuring all relevant parties are informed and prepared.
- Open and Closed-Source Research: Conduct thorough reviews of open-source intelligence, including industry blogs, forums, and public vulnerability databases. Utilize closed-source data from trusted partners to provide a well-rounded understanding of threat landscapes. Leverage automated tools to conduct continuous monitoring of threat activities, including dark web sites and hacker forums.
- Specialized Intelligence Tool Utilization: Lead the use of specialized tools, including Intel 471 and Mandiant, to collect and analyze threat intelligence. Use data visualization platforms like Power BI to produce visual insights, enhancing the communication of complex threat data to stakeholders.
- Threat Landscape Monitoring: Oversee the monitoring of the evolving threat landscape, identifying emerging cyber threats relevant to HHS and the HPH sector. Utilize advanced threat intelligence tools to gather and analyze data, providing timely alerts to key stakeholders.
- Collaboration and External Information Sharing: Develop and maintain relationships with external cybersecurity organizations to facilitate effective intelligence sharing. Collaborate with private and public sector partners to improve collective cybersecurity defenses, ensuring HHS benefits from shared insights.
- Healthcare-Specific Threat Analysis: Conduct targeted analysis focusing on threats impacting the healthcare sector, identifying unique vulnerabilities and trends that may affect healthcare systems. Provide guidance on appropriate threat mitigation measures specific to healthcare infrastructure.
- Threat Actor and Campaign Analysis: Conduct investigations into the tactics, techniques, and procedures (TTPs) used by adversaries targeting HHS systems. Develop predictive models to anticipate future actions of threat actors, providing valuable foresight to stakeholders.
Qualifications
- Clearance: Top Secret (TS/SCI)
Tools Used
- Splunk, PowerBI, Tableau
- ServiceNow, Salesforce, Remedy
- Wireshark, PhishMe, Mandiant
- Cisco Webex, Microsoft Teams, Adobe Creative Cloud
Apply for this position
Required*