Intelligence Analyst (Cyber) - TS/SCI Required

Washington, DC, United States

Logistics Management Institute

With a legacy of solving the government’s most complex challenges and an outcome-driven model to execute above expectation, LMI transforms missions with solutions that define the new speed of possible.

View company page

Overview

LMI is seeking a skilled Intelligence Analyst (Cyber) with a concentration in Cyber Healthcare and Public Health at our client facility in Washington, DC as needed. Top Secret/Sensitive Compartmented Information (TS/SCI) clearance is required.

 

LMI is a consultancy dedicated to improving the business of government, drawing from deep expertise in advanced analytics, digital services, logistics, and management advisory services. Established as a private, not-for-profit organization in 1961, LMI is a trusted third party to federal civilian and defense agencies, free of commercial and political bias. We operate completely free of political and commercial bias, and we are entirely aligned with the goals of our clients. Our clients value our specialized services in logistics, intelligence, homeland security, health care, and energy and environment markets. We believe government can make a difference, and we seek talented, hardworking people who share that conviction. We offer a generous compensation package with excellent benefits that start the first day of employment. Business casual dress, flex time, and tuition reimbursement are a few of our many work-life benefits available to our employees. LMI is The Washington Post's Top Work Places in 2021!

Responsibilities

  • Analyze cyber threat data across all available verticals/threat sources, including the MCM research, manufacturing, distribution, as well as proprietary data collection tools.
  • Analyze and disseminate healthcare-specific threat data and breached medical/healthcare industry data and disseminated digital exposure assessments, both within the government and external.
  • Provide Senior Leadership with the information required to make informed decisions and assume risks while still accomplishing our critical mission.
  • Review open-source reporting to include industry standard cybersecurity sources and closed source reporting to identify new cyber threats, including software vulnerabilities, malware, and schemes leveraged by malicious actors.
  • Develop products, briefings, summaries, executive reporting, and other materials necessary to disseminate information gathered to internal and external stakeholders.
  • Ingest indicators of compromise (IOC) from a variety of providers and formats on a continuous flow whilst categorizing and prioritizing those especially critical or relevant to the healthcare industry.
  • Enrich threat information with novel details and context on a scale proportional to the flow of information with a focus on finding connections to the healthcare industry and its critical infrastructure.
  • Maintain dossiers or knowledge base on threat actors and attack campaigns – to include associated entities, link analysis, and Tactics Techniques, and Procedures (TTPs) – in a manner that makes unstructured or uncategorized information usable.
  • Perform analysis on a technical level to determine indicators, develop security tool signatures, and help uncover TTPs.
  • Document insights as it pertains the healthcare industry from past and current security incidents regardless of the sector.
  • Be available, upon request of the government, to participate in any active investigation and to be prepared to contribute all applicable threat intelligence and cyber domain expertise it possesses.
  • Participate in information sharing through automated sharing of IOCs and industry workgroups and provide machine readable outputs for integration into other platforms.
  • Conduct production and analysis in a structured format, using routine analytical frameworks derived from general all-source intelligence methodologies and augmented with technical knowledge of the threat landscape.
  • Support due diligence efforts including assessment and risk rating of the supplier, manufacturer, and distributor based on the risk.
  • Coordinate and collaborate interagency partners for possible fraud/criminal activities identified and counterintelligence support.
  • Actively monitor manufacturers, suppliers, and distributors of vaccine/therapeutics and health care supplies/equipment for potential cyber related disruptions.
  • Prepare threat assessments and briefings.
  • Maintain personal and organizational interactions to enhance stakeholder relations and actively promote rapport with customers.
  • Draft, review, staff, file, and update a variety of documents (e.g., memorandums, information papers, presentations, issue papers, meeting minutes, etc.).
  • Deliver senior-level presentations and briefings.
  • Coordinate (i.e., prepare the meeting announcement, agenda, and presentation materials), participate in (i.e., provide verbal comment/recommendation concerning technical and management matters), and follow-up (i.e., develop meeting minutes and after-action correspondence for government review and approval) for all meetings.
  • Train supporting partners on cyber security risk management practices and process, in coordination with key coordinating offices.

Qualifications

  • At least 4-7 years of experience in a relevant field or work enviornment.
  • Experience in collection, analysis, and enhancement of cybersecurity intelligence, with the goal of improving the knowledge, responsiveness, and effectiveness of cybersecurity teams within the Healthcare and Public Health (HPH) sector and the government.
  • Experience responding to attacks on the HPH sector and preparing the sector for new threats requiring collaboration across key HPH stakeholders.
  • Experience and knowledge of HPH systems, partners, and relationships.
  • Experience conducting open-source research and analysis of cyber security considerations for mission-critical HPH capabilities and functions.
  • Experience sufficient to have the ability to identify HPH cyber risks and recommend risk mitigation.
  • Strong proficiency in Microsoft Office applications, including Word, PowerPoint, Excel, and Outlook.
  • Working knowledge of remote/virtual meeting environments such as Zoom, Microsoft Teams, and WebEx.
  • Ability to comprehend threats and vulnerabilities to HPH sector systems, critical assets, and infrastructure.
  • Strong organizational skills (e.g. time management, communication, setting goals, delegation, working under pressure, self-motivation, analytical thinking, attention to detail).
  • Exceptional proficiency in written and oral communications.
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Analytics Clearance Malware Nonprofit Risk management Threat intelligence Top Secret TS/SCI TTPs Vulnerabilities

Perks/benefits: Health care Startup environment

Region: North America
Country: United States
Job stats:  5  0  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.