Job Description :

RADGOV requests you to review the following contract opportunity. If you are willing to consider this opportunity, please submit your resume by Replying back with an updated resume rate expectation. Feel free to contact us for any additional information.

RADGOV is a professional service organization helping customers create synergies of information through the use of leading edge software applications. To know more about RADGOV please visit us at

Cyber Intelligence Analyst 3
Raleigh , North Carolina 27668, USA
11 Months Contract

Cyber Threat Intelligence Analyst. This position will be located in Raleigh, NC.
This position will work with the Cybersecurity Operations Center to identify, analyze, and mitigate threats to the customer’s network.

Duties include, but not limited to:
Selected candidate will collect and analyze event information and perform threat or target analysis duties.
Enables tools and techniques that can provide persistent monitoring and defend all designated networks, enclaves, and systems on a 24/7 basis
Interprets, analyzes, and reports all events and anomalies in accordance with Computer Network directives, including initiating, responding, and reporting discovered events.
Reviews incident logs/records mining for patterns and correlate with tools, including Splunk
Manages and executes first-level responses and addresses reported or detected incidents.
Coordinates with external organizations and authorities to collaborate on investigations, collect IOCs, share intelligence, etc.
Coordinates and distributes directives, vulnerability, and threat advisories to identified consumers.
Provides daily summary reports of network events and activities and delivers metric reports.
Recommend counter measures to malware and other malicious type code and applications that exploit customer communication systems.
Monitors various sources for threat intelligence on a regular basis.
Conduct reverse engineering for known and suspected malware files.
Develop policies and procedures to investigate malware incidents for the entire computer network.
Assist in the development and delivery of malware security awareness products and briefings.
Develops models for identifying malicious activity using various tools and statistical analysis.
Works closely with other teams to investigate and remediate incidents.

Basic Qualifications - To be considered for this position, you must minimally meet the knowledge, skills, and abilities listed below.
A Bachelors Degree and a minimum of 5 years related technical experience; or an additional 4 years of work experience can be substituted in lieu of the degree
Ability to gain and maintain a Public Trust clearance
Must be a self-starter and work well in a team environment
Must be a US Citizen or Permanent Resident
Must not have traveled outside the US for a combined total of 6 months or more in the last 5 years.
Must have resided in the US for the last 5 years
Position is based in Raleigh, NC and does not provide relocation assistance

Preferred Qualifications - Candidates with these preferred skills will be given preferential consideration:
Active Top Secret or Secret security clearance with the ability to obtain a TS/SCI.
Existing Public Trust clearance
CEH, MSCE, CGIA, CCNA, or CISSP Certification.
Statistical modeling and analysis experience to infer possible cybersecurity threats
Excellent written and verbal communication skills
Experience in analysis in investigations, such as with IT, law enforcement, military intelligence, or business analytics
Pentesting experience
Experience with Splunk

Client : Northrop Grumman