×
Register Here to Apply for Jobs or Post Jobs. X

Cyber Threat Intelligence; CTI Technical Lead Security Clearance

Job in Charleston, Charleston County, South Carolina, 29401, USA
Listing for: Sentar Inc
Full Time position
Listed on 2025-12-17
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Job Description & How to Apply Below
Position: Cyber Threat Intelligence (CTI)  Technical Lead with Security Clearance
Sentar is proud to be an employee-owned company, fostering a culture of empowerment, collaboration, and innovation. Sentar is dedicated to developing the critical talent that the connected world demands to create solutions to address the convergence of cybersecurity, intelligence, analytics, and systems engineering. We invite you to join the team where you can build, innovate, and secure your career. Sentar is seeking a Cyber Threat Intelligence (CTI)  Technical Lead in Charleston, SC!

Role

Description:

The candidate will provide analysis on relevant threats to the customer environment in support of overall defensive efforts. They will provide tactical context surrounding adversarial Tactics, Techniques, and Procedures (TTPs) and support Network Security Monitoring (NSM) and Incident Response (IR) teams. The primary responsibility is to analyze various sources of threat-related data using standard toolsets and methodologies and provide risk-related recommendations for action.

* Support threat intelligence collection, analysis, production, and dissemination of finished reporting products to internal security operations, information technology, enterprise risk management teams, and executive decision-makers.
* Lead a team in identifying cyber threats, trends, and new developments by analyzing open-source intelligence (OSINT) and other data.
* Maintain knowledge of adversary activities, including intrusion set TTPs.
* Communicate events to agencies regarding intrusions and compromises to network infrastructure, applications, and operating systems.
* Provide cyber threat assessments and coordinate threat tracking with other organizations and government partners.
* Provide cyber risk and threat identification through proactive monitoring of internal and external environments for malicious code, vulnerabilities, and attacks.
* Compile and maintain internal Standard Operating Procedure (SOP) documentation.
* Ensure documentation and capabilities remain compliant with Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510.01B and other applicable policy directives.
* Participate in program reviews, product evaluations, and onsite certification evaluations.
* Analyze and present complex threat intelligence information in a meaningful and actionable way.
* Support incident response actions (surge operations) as needed.

Qualifications:

Clearance Level:
* Minimum of a Top Secret (TS) Clearance

Education:

N/A

Certifications:

* Must meet applicable Department of Defense (DoD) 8570 and DoD 8140 Information Assurance Technical (IAT) Level III certification requirements.
* Must meet applicable DoD Cybersecurity Network Defense (CND) certification requirements.

Experience:

* 7+ years of experience in incident response, IT security, malware analysis, security product development, offensive security, tracking cyber threats, or a similar cybersecurity environment.
* Position may require up to 10% travel as needed.
* Overtime may be required to support incident response actions (surge operations).

Preferred Qualifications:

* Demonstrated ability to leverage intelligence on attacker methodology, tools, and infrastructure to improve security posture.
* Ability to edit finished products based on highly technical subject matter and analysis for dissemination to less technical or non-technical audiences.
* Experience collecting, analyzing, and interpreting qualitative and quantitative data to produce meaningful intelligence products.
* Functional understanding of security infrastructure such as firewalls, Intrusion Detection/Prevention Systems (IDS/IPS), proxy servers, email controls, anonymizing technology, and Security Information and Event Management (SIEM) systems.
* Functional understanding of common threat analysis models, including the Diamond Model, Cyber Kill Chain, and MITRE ATT&CK framework.
* Experience with detection creation methodologies across multiple platforms.
* Excellent oral and written communication skills, including the ability to brief senior leadership and agency groups. Highly Desired:
* Experience with analytical tools, including Augury, Splunk, Threat Analysis Console (TAC), Palantir, Shodan, Analyst Notebook, or other Threat Intelligence Platforms (TIPs).
* Experience collaborating and coordinating with intelligence community partners on cybersecurity topics.
* Ability to develop specialized expertise, discern patterns of complex threat actor behavior, and communicate a comprehension of current and emerging cyber threats.
* Experience in cyber defensive or offensive operations, information operations, or information warfare.
* Self-motivated with a passion for cybersecurity and intelligence analysis. Benefits at Sentar:
Our unique ownership model attracts top talent, giving employees the freedom to take initiative and drive meaningful improvements. In addition to cultivating a thriving and inclusive work environment, Sentar offers an extensive benefits package designed to support the well-being of employees and…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary