"Alerted.org

Job Title, Industry, Employer
City & State or Zip Code
20 mi
  • 0 mi
  • 5 mi
  • 10 mi
  • 20 mi
  • 50 mi
  • 100 mi
Advanced Search

Advanced Search

Cancel
Remove
+ Add search criteria
City & State or Zip Code
20 mi
  • 0 mi
  • 5 mi
  • 10 mi
  • 20 mi
  • 50 mi
  • 100 mi
Related to

  • Cybersecurity Analyst Lead (Threat Intelligence)

    Washington Metropolitan Area Transit Authority (VA)



    Apply Now

    Cybersecurity Analyst Lead (Threat Intelligence)

    Job ID:

    250347

    Location:

    VA - Metro Bldg At Eisenhower

    Full/Part Time:

    Full-Time

     

    Posting Open-Close

     

    04/24/2025

     

    -

     

    05/09/2025

     

    Union

    NRP

    Regular/Temporary:

    Regular

    Job Description

    Department Marketing Statement:

    The Washington Metropolitan Area Transit Authority (Metro) is building a state-of-the-art cybersecurity program to safeguard the critical transit infrastructure of our nation¿s capital. The Program Lead for Threat Intelligence, will spearhead a dynamic team tasked with identifying emerging threat intelligence trends, assessing risks associated with security events, and analyzing potential attacks that could compromise Metro¿s data, systems, and interests. The role will encompass providing comprehensive vulnerability analyses, orchestrating communications with external parties to bolster that assessment, and delivering investigation finding to pertinent business units to fortify our information security posture. Leveraging a blend of security tools, open-source intelligence, and expert acumen. This position plays a pivotal role in enhancing the maturity of our managed security service provider while actively contributing to diverse projects, meeting, and ad-hoc requests. Additionally, the lead will be responsible for leading the charge in process improvement initiatives, coordinating key threat intelligence activities, collaborating closely with the Cyber Fusion Center (CFC), Purple Team, and other internal stakeholders to foster a holistic fusion program.

     

    The ideal candidate for this role will be a seasoned cybersecurity professional with a track record of excellence in threat intelligence research and reporting. The Program Lead should possess a wealth of knowledge on diverse methods and tools utilized in the detection, investigation, and response to cyber intrusions. Moreover, adept problem-solving skills will enable the Lead to assess threats effectively, leveraging logs, alerts, network data, and other pertinent information sources to safeguard Metro against evolving cyber threats.

    Minimum Qualifications

    Education

    + A Bachelor¿s degree from an accredited college or university

    Experience

    + Six (6) years of experience as a cybersecurity officer/engineer, information systems security officer, or specialized expertise in cyber policy, intelligence, analytics, budget, audit, metrics, or training such that it meets the specific role posted

     

    Preferred

    Education

    + A Bachelor¿s Degree in Computer Science, Cybersecurity or a related technical field

     

    Medical Group

     

    Satisfactorily complete the medical examination for this position, if required. The incumbent must be able to perform the essential functions of this position either with or without reasonable accommodations.

    Summary

    The Cybersecurity Analyst - Lead is responsible for identifying and remediating security threats. The analyst designs defensive measures and monitors information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems and networks from threats.

    Essential Functions

    + Supporting the director, oversees the data analytics strategy based on the National Institute of Standards and Technology (NIST) Cybersecurity Framework. This includes analyzing threat information from multiple sources, disciplines, and agencies across the Intelligence Community; Synthesizing and placing intelligence information in context; draws insights about the possible implications. Ensures threats and vulnerabilities are identified as early as possible and mitigated.

    + Oversees the development of cyber threat indicators, attacks and compromise monitoring and maintains awareness of the status of the highly dynamic operating environment. Coordinates the collection, processes, analysis, and dissemination of cyber threat and warning assessments. Ensures vulnerabilities are identified as early as possible and mitigated.

    + Oversees the intelligence of data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within the WMATA's environments (on-premises and cloud) for the purposes of mitigating threats.

    + Oversees the development of performance and effectiveness assessment plans and measures. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness. Ensures that systems and networks are developed and deployed securely, leveraging best industry standards and a thorough understanding of both security and enterprise architecture.

    + Supporting the director, oversees the production of assimilation of data and information from analytics and intelligence to support the creation of dashboards which inform senior leaders regarding the security posture of the organization. Generates routine and ad hoc urgent reports and action plans to support enhanced security procedures and response measures to ongoing or imminent threats. Ensures that WMATA has a properly managed and reportable cyber threat intelligence awareness program.

    + Oversees the analysis of defensive and simulated offensive results, techniques used, and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats.

    + Oversees the response to routine and urgent cybersecurity situations within the pertinent domain to mitigate immediate and potential cyber threats. Uses mitigation, preparedness, and response and recovery approaches, to maximize safety, preservation of property, and information security. Investigates and analyzes all relevant incident response activities. Ensures real-time cyber defense incident handling tasks are executed (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) to support deployable Incident Response Teams (IRTs).

    + Oversees the incident response support functions through technical activities that gather evidence on criminal or foreign intelligence entities to mitigate possible or real-time threats, protect against insider threats, sabotage, international terrorist activities, and to support other intelligence activities. Investigates, analyzes, and responds to cyber incidents within the network environment or enclave. Ensures that the organization responds to attacks quickly and eliminate threats.

    + Oversees the consultation for the support program to establish relationships, between the incident response team and other groups, both internal (e.g., General Counsel¿s Office) and external (e.g., law enforcement agencies, vendors, public relations professionals).

    + Oversees the process that applies tactics, techniques, and procedures for a full range of investigative tools and processes to include, but not limited to, interviews, cyber surveillance, counter surveillance, and surveillance detection, and appropriately balances the benefits of intelligence gathering. Ensures that vulnerabilities are identified as early as possible and mitigated.

    + Provides program oversight of activities to produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies). Analyzes collected information to identify vulnerabilities and potential for exploitation. Ensures that the reporting of all cyber events/activity are presented in a timely and actionable media; consistent with cyber intelligence and security best practices.

    + Oversees detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate and impose requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace. Ensures the reporting of all cyber events/activity are presented in a timely and actionable media; relevant to cyber intelligence and security best practices.

    + Oversees the monitoring of all defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from internal and external threats. Takes appropriate action by reporting, remediating and/or providing preventive recommendations. Acts as the liaison between the security engineering and authorizing official. Ensures that analysis of the information (data) from various sources within the enterprise is executed and identifies possible security violation or threat.

    + Oversees the process and analysis that identifies, collects, examines, and preserves evidence using controlled and documented analytical and investigative techniques. Manages the analysis of digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation. Ensures the forensically sound collection of images and inspects to discern possible mitigation/remediation on enterprise systems.

     

    The essential duties listed are not intended to limit specific duties and responsibilities of any particular position. Nor is it intended to limit in any way the right of managers and supervisors to assign, direct and control the work of employees under their supervision.

     

    Evaluation Criteria

     

    Consideration will be given to applicants whose resumes demonstrate the required education and experience. Applicants should include all relevant education and work experience.

    Evaluation criteria may include one or more of the following:

    + Skills and/or behavioral assessment

    + Personal interview

    + Verification of education and experience (including certifications and licenses)

    + Criminal Background Check (a criminal conviction is not an automatic bar to employment)

    + Medical examination including a drug and alcohol screening (for safety sensitive positions)

    + Review of a current motor vehicle report

     

    Closing

     

    WMATA is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, national origin, disability, status as a protected veteran, or any other status protected by applicable federal law.

     

    This posting is an announcement of a vacant position under recruitment. It is not intended to replace the official job description. Job descriptions are available upon confirmation of an interview.

     


    Apply Now



Recent Searches

[X] Clear History

Recent Jobs

  • Cybersecurity Analyst Lead (Threat Intelligence)
    Washington Metropolitan Area Transit Authority (VA)
[X] Clear History

Account Login

Cancel
 
Forgot your password?

Not a member? Sign up

Sign Up

Cancel
 

Already have an account? Log in
Forgot your password?

Forgot your password?

Cancel
 
Enter the email associated with your account.

Already have an account? Sign in
Not a member? Sign up

© 2025 Alerted.org