×
Register Here to Apply for Jobs or Post Jobs. X

CI Cyber Threat Analyst Security Clearance

Job in Springfield, Fairfax County, Virginia, 22150, USA
Listing for: Sphinx
Full Time position
Listed on 2025-11-17
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, Security Manager, Data Security
Salary/Wage Range or Industry Benchmark: 120000 - 135000 USD Yearly USD 120000.00 135000.00 YEAR
Job Description & How to Apply Below
Position: CI Cyber Threat Analyst with Security Clearance
About Sphinx
Sphinx is a full spectrum security and intelligence company established by a group of like-minded Veterans. We are passionate about supporting our client’s missions and ensuring they are prepared to address the modern threat environment. Sphinx provides services to an array of clients within the US Intelligence Community, Department of Defense, Cleared Defense Contracting, Defense Industrial Base, and Private Sector. We are comprised of 75% Veteran staff and pride ourselves on maintaining a close knit and collaborative work environment.

Sphinx prioritizes the wellbeing of our personnel and we are dedicated to helping you achieve your personal goals. We offer a competitive benefits package to include a 401K with corporate match, paid health, vision, dental, and other insurance options. Sphinx also offers a variety of incentives and opportunities to support the development and growth of our personnel. CI Cyber Threat Analyst
Clearance:
Must currently possess an active TS/SCI security clearance and be able to obtain a CI polygraph after hire (if not before)

Location:

Springfield, VA
Salary Range: $120,000 – $135,000

Experience:

Must have at least 7 years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber, CI, or law enforcement investigations.

Description:

Sphinx Counterintelligence Cyber Threat Analysts support sensitive national security investigations and computer network defense operations on behalf of our clients. Sphinx Cyber CI threat Analysts conduct all-source cyber threat analysis in support of CI investigations and CI Support to computer network defense. Responsibilities
- Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE or Criss Cross).

- Provide Technical CI advice and expertise in support of CI inquiries, operations and issues.

- Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.

- Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers.

- Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner.

- Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.

- Demonstrate current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats.) - Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.

- Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.

- Display an ability to collaborate with internal customer and external IC/Cyber community members.

- Coordinate CI Cyber activities originating from Enterprise Incident Response Events.

- Conduct liaison between CI Office and Cyber Security Operations Center (CSOC).

- Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures.

Required Qualifications
- Must currently possess an active TS/SCI security clearance and be able to obtain a CI polygraph after hire (if not already held)
- Must be a self-motivated, disciplined, and mature professional capable of operating with little tasking and oversight
- Must be capable of operating within a diverse environment and comfortable operating with limited guidance and oversight, maturity and self-motivation required.
- Clear and concise writing skills and positive, engaging communication skills.
- Bachelor's Degree or equivalent experience in a related field.
- 7 years of Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations.

- Demonstrate experience with of foreign adversaries’ security and intelligence services, terrorist organizations, and threats posed to US Gov. Desired Qualifications
- Credentialed graduate of an accredited federal or DoD Counterintelligence training academy (DCAC, CISAC, CIIAC, AFOSI, NCISA, FBI).

- Bachelor’s degree in Science, Technology, Engineering or Mathematics disciplines.

- Post-graduate degree in Science, Technology, Engineering or Mathematics disciplines.

Experience with malware analysis. Benefits:

• 401(k)

401(k) matching

• Dental insurance

• Flexible schedule

• Health insurance

• Health Savings Account (HSA)

• Life insurance

• Paid time off

• Parental leave

Professional development assistance

• Referral program

• Retirement plan

• Vision insurance
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary