Apply Now    

Cybersecurity Technical Intel Analyst/Briefer

Req #: 241987
Location: Linthicum, MD US
Job Category: Information Technology
Minimum Clearance Required: Top Secret

Job Description

Primary Cyber Threat Intelligence Briefer for the Defense Cyber Crime Center (DC3) DoD-Defense Industrial Base Collaborative Information Sharing Environment (DCISE) mission. The successful candidate will create, maintain and present cyber threat intelligence briefings to a variety of audiences including the Defense Industrial Base (DIB) and USG Stakeholders that are responsible for supporting computer network defense (CND) operations . Mission briefings are focused on Advanced Persistent Threat (APT) activity, intrusion set tactics, techniques, and procedures (TTPs), and the targeting analysis of CDCs and DIB Partners. DC3/DCISE analysis and threat products are based on partner incident reporting, government reporting, and OSINT analysis.

Required Skills:

-Ability and desire to create and deliver in-depth briefings of reported cyber targeting, trends, and technology, to include attack vector, technique, and mitigation

-Polished presentation skills with the ability to adjust content and delivery to a variety of audiences with varying cyber technical knowledge and experience

-Strong experience tracking Advanced Persistent Threat (APT) cyber activity with an understanding of common intrusion set tactics, techniques, and procedures (TTPs)

-Demonstrated experience authoring various types of cyber threat intelligence products

-Experience using analytical approaches or methodologies such as Diamond Model of Intrusion Analysis, Cyber Kill Chain, Mitre ATT&CK framework

-Experience performing cyber threat analysis based on Indicators of Compromise (IOCs)

-Experience performing open source analysis for cyber event correlation, data enrichment, and threat hunting

-Demonstrated motivation to maintain awareness of current cybersecurity and threat intelligence news and trends

-Must have Active Top Secret Clearance

Desired Skills:

-Technical skills proficiency in: network defense operations (SIEM, firewalls, IDS/IPS, Proxies), basic malware analysis and/or digital computer forensics

-Certifications: CASP, GCIA, GCIH, or GCFE

Suggested Qualifications: 13 years of professional experience without a degree; or 5 years of professional experience with a Bachelors degree from an accredited college in a related discipline, or equivalent experience/combined education; or 3 years of professional experience with a related Masters degree; or no experience required with a related PhD or JD. Consideration should always be given for the level of specific domain expertise.

What We Can Offer You:

- We’ve been named a Best Place to Work by the Washington Post.

- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.

- We offer competitive benefits and learning and development opportunities.

- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.

- For over 55 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.


Job Location



CACI employs a diverse range of talent to create an environment that fuels innovation and fosters continuous improvement and success. At CACI, you will have the opportunity to make an immediate impact by providing information solutions and services in support of national security missions and government transformation for Intelligence, Defense, and Federal Civilian customers. CACI is proud to provide dynamic careers for employees worldwide. CACI is an Equal Opportunity Employer - Females/Minorities/Protected Veterans/Individuals with Disabilities.

Apply Now