Please note this is not a cyber security or systems engineer
position. The selected candidate will serve as a cyber intelligence
analyst and must have relevant experience as such (see below for
requirements). Candidates will be focused on analysis and reporting
of cyber intelligence, writing tactical and operational cyber
threat reports. Candidates must be have a strong background
tracking APT activity and be able to marry traditional intelligence
analysis with current cyber focus.
Due to the secure nature of the mission-critical work that we
perform, remote work is NOT allowed.
We do offer relocation assistance for those relocating 75 miles
Must be a US Citizen with a TOP SECRET security clearance (no
exceptions) *TS/SCI preferred
Must hold a BS degree in Information Security, Computer Science,
Cyber Security, Intelligence Studies, Applied Intelligence,
Regional Studies, International Affairs, Political Science &
Analysis or another related field of study.
2+ years of experience tracking and classifying APT groups
Comprehensive understanding of TTPs and indicators of
Experience writing reports, using multi-source intelligence and
narrative analysis that lead to evidence-based conclusions
Ability to brief small audiences up to the executive level
Must be current with knowledge regarding the cyber threat
landscape at classified and unclassified levels
Experience supporting network defenders and preventing
unauthorized access, use, disclosure, disruption, modification,
inspection, recording or destruction of information.
Ability to develop Yara or Snort Signatures
Certifications such as CISSP, GCIH, Network+, Security+, etc
and/or direct study
Formal training in intelligence analysis techniques
- Mission focused work environment
- Subsidized medical/dental/vision insurance
- HSA contributions
- 401k matching
- Holiday and Paid Time Off (PTO)
- Monthly WAN parties & quarterly events
- Flexible hours
Remote work is not an option.
CIPHER TECH IS COMMITTED TO HIRING QUALIFIED VETERANS!
At Cipher Tech Solutions, Inc. (Cipher Tech), we take great
pride in supporting some of the most mission critical work in the
Department of Defense and the Intelligence Community. The majority
of our company is comprised of extremely talented software
developers who write production tools which directly support one of
two missions: digital forensics and malware reverse
Digital forensics is the practice of extracting and processing
evidence from computers, phones, tablets, cameras, flash-drives,
and just about any other form of digital media. The results of our
work are then used to support federal and military law enforcement,
counter intelligence, and counter terrorist activities.
Malware reverse engineering is the practice of analyzing
extremely advanced malicious code. The goal of a reverse engineer
is to understand how the malicious code works and determine facts
How did it infect the victim's computer
What kind of information it is seeking to steal
How is it communicating with the author (actor)
Who that actor might be
All qualified applicants will receive consideration for
employment without regard to race, color, religion, sex, sexual
orientation, gender identity or national origin.