We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Insider Threat Analyst IV

Agile Defense, LLC
United States, Virginia, Alexandria
Apr 11, 2025
At Agile Defense we know that action defines the outcome and new challenges require new solutions. That's why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.
Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests.
Requisition #871
Job Title: Insider Threat Analyst IV | Exempt
Location: Hybrid 2x week onsite - 600 Dulany StreetAlexandria, Virginia 22314
Clearance Level: Active DoD - Top Secret
Required Certification(s):
* N/A
SUMMARY
The United States Patent and Trademark Office (USPTO), Cybersecurity Division, has a requirement to support a Cyber Threat Intelligence (CTI) capability within USPTO. This support includes monitoring activities, developing cyber threat analysis, identifying mitigation and remediation courses of action, sharing actionable cyber threat intelligence used in organizational IT asset protection, trending strategic cyber threats and situational awareness.
A successful candidate will enable our government operational counterparts to promote the rapid analysis of national level cyber threats and incidents. The hours for the position are Monday through Friday core hours but the ideal candidate will provide technical support on-call to a 24x7 cyber program in the areas of cyber threat intelligence, cyber hunt, and incident response.
JOB DUTIES AND RESPONSIBILITIES
* Assist with the USPTO Security Operations Center (SOC) with identifying valid Indicators of Compromise (IOC's) and implementing appropriate monitoring, alerting, or blocking.
* Assist with development and contributions to cyber threat intelligence products for distribution to Federal Partners over classified and unclassified communication networks.
* Compile cyber threat data gathered including the following and related cyber threat data present and emerging adversarial tactics, techniques, and procedures through independent research and analysis of identified activity combined with current SOC operations.
* Analyze unclassified and classified sources of information and cyber threat intelligence on foreign and domestic cyber threats, including recommended mitigation and remediation actions, as well as indicators of compromise (IOC's) that could affect USPTO information systems and /or networks.
* Perform cyber and technical threat analyses of hostile nation state actors, cybercriminals, terrorist organizations, and other malicious actors that could harm USPTO information systems and networks and report on any suspected or verified findings.
* Conduct link analysis of technical data using software tools to identify trends in attacks, targeting, and timing of suspicious/malicious activity.
* Report on key trends in cyber threat-related technology development or cybersecurity concerns associated with USPTO information systems and networks.
* Produce situational, incident-related reports on cyber threats that could affect USPTO networks.
* Assist the Government in historical tracking and reporting current trends on cybersecurity events and incidents, including to the following and related activities phishing, malware, and scanning/probing activity.
* Assist the Government with information requests, perform specialized cyber threat analyses, and produce reports for the Government and external organizations.
* Assist the USPTO SOC with advanced intrusion detection capability by providing the adversarial tactics, techniques, and procedures along with IOC's and recommended detection rules.
* Recommend countermeasures to malware and other malicious activity that could exploit USPTO information systems and networks.
* Assist the Government with the dissemination of cyber threat information to senior management, security personnel, and key stakeholder communities, including the U.S. Intelligence Community, the U.S. Department of Defense, U.S. Federal Law Enforcement entities, and others as required.
* Assist the USPTO SOC with development of cybersecurity content, such as rules, signatures, and other methods to detect cyber threat activity
* Assist with formatting reports from various outputs targeting diverse audience (e.g., other analysts, management).
* Create metrics and Key Performance Indicators (KPIs) detailing the operational status and performance of CTI.
* Proactively utilize USPTO cybersecurity capabilities to search through USPTO information systems to detect and work with the USPTO SOC to isolate advanced threats that may evade existing security solutions.
* Develop Cloud IOC detection and response.
* Ensure threat intelligence is machine readable allowing it to be easily stored, analyzed, and transmitted in a structured format and allowing REST API integration (STIX/TAXII).
* Identify AI/ML or innovative solutions to automate threat intelligence feeds and analysis.
QUALIFICATIONS
Required Certifications
* N/A
Education, Background, and Years of Experience
* Bachelor of Arts / Science
* Minimum 7 year of experience
* A Master's Degree or higher may substitute for two (2) years of experience.
ADDITIONAL SKILLS & QUALIFICATIONS
Required Skills
* A minimum of seven (7) years of professional experience with a solid understanding of incident response, insider threat investigations, forensics, cyber threats, and information security.
* A minimum of seven (7) years of experience as a Tier III senior cyber security analyst performing intelligence analysis, collection management, and technical analysis. Out of those, a minimum of five (5) years of hands-on experience that includes host-based and network-based security monitoring using cybersecurity capabilities. Some of the hands-on experience must be recent within the past 2 years.
* The candidate must possess a strong cyber security background with experience in host-based and network-based forensics related to the identification of advanced cyber threat activities, intrusion detection, incident response, malware analysis, security content development (e.g., signatures, rules etc.), and cyber threat intelligence.
* Must have experience in developing scripts to support cyber threat detection that outputs result in a variety of formats, such as Powershell and Javascript and REST API, Python, C++, and HTML, XML or other type most appropriate for the task.
* Must have experience in conducting cyber threat analysis, identifying mitigation and remediation courses of action; developing actionable intelligence used to protect organizational IT assets; and trending cyber threat metrics for leadership situational awareness.
* Must have experience in maintaining a comprehensive understanding of the cyber threat landscape, including identifying and analyzing cyber threats actors and activities to enhance cybersecurity posture of the organization's IT operating environment.
* Ability and experience extracting and managing complex large data sets.
* Strong documentation and written communication skills with technical report writing experience.
Preferred Skills
* Certificates Preferred: GCTI, CTIA, CCSP, Cybersecurity Analyst+ or similar cert.
* Bachelor's degree in a cyber related field
* Familiarity with DIA writing standards, and applicable knowledge of Intelligence Community Directive (ICD) 203 & ICD 106 standards
* Cyber related Certificates showing SME in Threat Intel, Defense/Blue teaming, digital forensics, and/or working with the cyber kill chain, IOCs, TTPs of APTs etc.
* Such certs include: GCTI, CTIA, CCSP, Cybersecurity Analyst+ etc.
* Experience working with ICS/SCADA/OT equipment and/or have certifications/education relating to industrial control systems
WORKING CONDITIONS
Environmental Conditions
* Traditional office setting.
Strength Demands
* Sedentary - 10 lbs. Maximum lifting, occasional lift/carry of small articles. Some occasional walking or standing may be required. Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.
Physical Requirements
* Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; See
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together.
What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.
We also believe in supporting our employees by offering a competitive and comprehensive benefits package. To explore the benefits we offer, please visit our website under the Careers section.
Happy - Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.
Helpful - Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.
Honest - Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.
Humble - Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.
Hungry - Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.
Hustle - Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
Apply for this job
Applied = 0

(web-77f7f6d758-2q2dx)