Cyber Analysis Lead
Listed on 2026-01-02
-
IT/Tech
Cybersecurity, Information Security
Overview
Edgewater Federal Solutions Sector is seeking a Cyber Analysis Lead for the Department of Defense (DoD). The successful candidate will be responsible for leading and directing a team of cyber analysts in the identification, analysis, and mitigation of cyber threats and vulnerabilities and the preparation of tailored mitigation recommendations focused on risk reduction. Develop and implement security monitoring strategies and procedures to improve the organization's overall security posture.
Lead and mentor a team of cyber analysts, providing guidance on threat intelligence analysis and vulnerability assessments. Provide actionable risk-reduction recommendations to stakeholders based on threat intelligence and analysis findings, contributing to proactive security improvements.
- Lead a Team of Cyber Analysts: Oversee and direct the work of a team of cyber analysts in identifying, analyzing, and responding to cyber threats, vulnerabilities, and risks. Provide mentorship and guidance to team members, ensuring skill development and high-quality deliverables.
- Threat Intelligence Analysis: Conduct threat analysis using data from various intelligence sources to identify potential cyber risks and ongoing attacks. Guide the team in collecting, correlating, and analyzing threat intelligence data to detect malicious activity.
- Vulnerability Analysis and Mitigation: Perform detailed assessments of vulnerabilities in the organization's networks, systems, and applications. Develop tailored mitigation strategies and recommendations to address vulnerabilities and reduce overall cyber risk.
- Develop Security Monitoring Strategies: Design and implement robust security monitoring procedures and strategies to proactively identify and mitigate emerging cyber threats. Optimize existing security monitoring tools and processes to enhance the organization’s detection and response capabilities.
- Provide Risk-Reduction Recommendations: Translate threat intelligence and analysis findings into actionable risk-reduction recommendations for stakeholders. Collaborate with stakeholders to implement long-term strategies for improved security posture and risk mitigation.
- Incident Response Support: Lead or support the team in analyzing and responding to security incidents, leveraging threat data to investigate and contain breaches.
- Develop and Maintain Documentation: Author and review team deliverables, such as reports, briefings, and dashboards, to communicate findings and recommendations effectively. Create and maintain detailed incident, threat intelligence, and vulnerability assessment documentation.
- Collaboration with Stakeholders: Work closely with IT and security teams to coordinate threat intelligence sharing, enhance risk awareness, and implement security measures. Act as a key liaison between cyber analysts and organizational leadership to align security efforts with strategic priorities.
- Continuous Analysis and Process Improvement: Assess and refine cybersecurity processes, tools, and methodologies to ensure efficiency and effectiveness. Stay updated on emerging cyber threats, attack techniques, and countermeasure technologies to inform strategic decisions.
- Manage Tools and Resources: Oversee the configuration and optimization of network security tools (Assured Continuous Assessment Solution (ACAS), Trellix e-Policy orchestrator (ePO), Microsoft Defender for Endpoint/Server (MDE/S), Splunk’s SOAR, Splunk’s Enterprise User Behavioral Analytics (EUBA), Palo Alto Networks (PAN) IPS modules on Firewall (FW) hardware, Tanium, Privilege Access Management (PAM), Fortify Software Security Center (SSC), Fortify Static Code Analyze, Portswigger Burp, Fortify Web Inspect, Red Hat Advanced Cluster Security for Kubernetes, Sonatype Repository Firewall and SBOM Manager), including intrusion detection/prevention systems (IDS/IPS), SIEM platforms, and vulnerability scanners.
Evaluate and recommend new tools and technologies to strengthen the organization’s cyber defense capabilities.
Knowledge, Skills, and Abilities
- Advanced Knowledge of Network Infrastructure: Deep understanding of network architectures, protocols (e.g.,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).