More jobs:
Cyber Threat Intelligence Analyst
Job in
Crownsville, Anne Arundel County, Maryland, 21032, USA
Listed on 2026-03-15
Listing for:
DMI (Digital Management, Inc.)
Full Time
position Listed on 2026-03-15
Job specializations:
-
IT/Tech
Cybersecurity, IT Consultant
Job Description & How to Apply Below
Job Title
Cyber Threat Intelligence Analyst
About DMIDMI is a leading provider of digital services and technology solutions, headquartered in Tysons Corner, VA. With a focus on end-to-end managed IT services, including managed mobility, cloud, cybersecurity, network operations, and application development, DMI supports public sector agencies and commercial enterprises around the globe. Recognized as a Top Workplace, DMI is committed to delivering secure, efcient, and cost-effective solutions that drive measurable results.
Learn more at
DMI, LLC is seeking a full time Cyber Threat Intel Analyst to support a state customer.
Duties and Responsibilities:
- Conduct all-source analysis, digital forensics, and targeted research to identify, monitor, assess, and counter the threat posed by criminal cyber actors. Utilize threat intelligence platforms and tools to mitigate potential threats to users, networks, and data.
- Respond to computer security incidents in compliance with Information Security Policies and Industry Best Practices. Coordinate the efforts of and provide timely updates to multiple sectors and business units during incident response. Additionally, the candidate will provide security related recommendations to the team as threat events unfold.
- Provide information and assessments for the purposes of informing leadership and users/customers.
- Perform network security analysis in support of Intrusion Detection operations including the development and enrichment of indicators used to enhance the network security posture.
- Contribute to a team of information security professionals analyzing threat data, writing reports, briefing event details to leadership, and coordinating remediation activities across multiple State agencies.
- Ensure technical security improvements are effective and maintained within configuration management structures.
- Ensure technology employed by the Security Monitoring Team complements operational processes.
- On occasion, provide extended shift coverage with minimal travel required.
- Monitor various information security related platforms and forums including Recorded Future, Anomali Threat Stream, SANS Internet Storm Center, Krebs on Security, and other forums and mailing lists to stay up to date on current network threats, attack methodologies and trends.
- Analyze the potential impact of new threats and exploits and communicate risks to relevant leadership and business units.
- Monitor the State of Maryland networks to find anomalous or malicious activity using various analytical methods and SEIM tools in a fast-paced operational environment.
Education and Years of
Experience:
- Bachelor's Degree in Computer Science/Computer Engineering, Information/Network Security, Cybersecurity, or related field with 5-7 years of related work experience; OR equivalent experience in lieu of degree.
Required Skills &
Certifications:
- Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
- Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise.
- Coursework and previous experience directly related to Cyber Operations environment.
- Experience with Splunk, Service Now, Recorded Future, Anomali Threat Stream, and other cybersecurity tools as required.
- Ability to work in a team environment and take initiative to understand and master new operating systems, security applications and open-source tools.
- Knowledge with Windows and Linux operating systems and common applications, working knowledge of and experience in detecting malicious code and methods of infection (ports, attachments, etc.).
- Knowledge of information systems security concepts and technologies; network architecture and tools; general database concepts; document management; hardware and software troubleshooting; intrusion tools; and open-source alternatives.
- Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack,…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×