Cyber Threat Emulation Analyst
Listed on 2025-11-22
-
IT/Tech
Cybersecurity, Network Security, Security Manager, Information Security
Location: Colorado Springs, CO – Schriever Space Force Base or Huntsville, AL – Redstone Arsenal (On-site)
Clearance Required: Active Secret Clearance (or higher)
Travel Required: Up to 10%
Launch Tech is seeking a Mid-Level Cyber Threat Emulation Analyst to support the Missile Defense Agency (MDA). In this role, you will strengthen enterprise cyber defenses by conducting threat emulation, vulnerability analysis, incident response, and cyber operations assessments. You will contribute directly to improving the agency’s defensive posture while mentoring analysts and executing cyber threat emulation engagements aligned with real-world adversary tactics.
WhatYou’ll Do
As a Mid-Level Cyber Threat Emulation Analyst, you will:
- Perform Defensive Cyber Operations (DCO) and Cyber Security Service Provider (CSSP) duties outlined in Evaluator Scoring Metrics (ESM)
- Perform cybersecurity duties on customer networks to improve enterprise-wide security posture
- Analyze correlated asset, threat, and vulnerability data against known adversary exploits and techniques to determine operational impacts and strengthen defensive posture
- Support the development, review, and updates of DCO procedures, processes, manuals, and other documentation
- Measure defense-in-depth effectiveness against known vulnerabilities
- Generate vulnerability assessment reports and elevate findings for review
- Support enterprise Incident Response in accordance with DoD regulations and instructions
- Lead cyber events and incident investigations from start to conclusion, including data gathering, analysis, and reporting
- Instruct, evaluate, and mentor analysts at junior, mid, and senior levels; support development of exploitation analyst training plans
- Receive, review, and implement Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders weekly
- Perform Cyber Threat Emulation (CTE) actions using Automated Security Validation toolsets per HHQ direction
- Execute CTE actions within approved network zones using specific adversary tactics, techniques, and procedures (TTPs)
- Create dashboards and reports communicating post-engagement analysis, vulnerabilities, recommended remediations, system security posture assessments, and incident response results
- Draft and submit Cyber Tasking Orders (CTOs) to address findings discovered during CTE engagements
- Collaborate with the Cyberspace Domain Awareness (CDA) team to develop evaluation criteria and methodologies aligned with HHQ inspection requirements and industry best practices
Basic Requirements:
- Must have 6, or more, years of general (full-time) work experience
- Must have 4 years of combined experience with:
- Performing manual or automated penetration tests in an enterprise environment
- Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments
- Experience performing the full life cycle of incident response and enterprise-level monitoring
- Must have 1 year of experience in management or leadership in a team environment
- Must have a current DoD 8570.01-M IAT Level II certification with Continuing Education (CE) (CySA+, GICSP, GSEC, Security+ CE, SSCP)
- Must have, or obtain within 6 months of start date, a Pen Test+ certification
- Must have an active DoD Secret Security Clearance
Desired Requirements:
- Have a Bachelor’s degree, or higher, in Cybersecurity, Computer Science, or related field
- Have experience with Cyber Threat Emulation tools, policies, and procedures
- Have experience operating custom software on a Linux platform
- Have experience with security analysis and solutions in WAN/LAN environments (Routers, Switches, Network Devices, Windows, Linux)
- Have experience with SOC/DCO tools including Firewalls, Intrusion Detection/Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc.
- Have experience performing security compliance scans across a WAN (ACAS/Nessus preferred)
- Have a background in configuration, troubleshooting, and deployment of host-based security (ESS preferred)
- Be able to mentor and train personnel in a high‑paced environment
- Be familiar with DoD Security Operations Centers (SOC/CSSP)
- Be familiar with DCO/CSSP‑guiding security policies and procedures
- Have…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).