Location work will be performed: NCO024 - Morrisville - 6001 Hospitality Court
Job Description: Cyber Threat Analyst III Identifies and assesses the capabilities and activities of cyber criminals or foreign intelligence entities; produces finds to help initialize or support law enforcement and counterintelligence investigations or activities.
Required Experience:
Six years of analytic experience, to include a minimum of 3 years of cyber-analytic experience.
Key Responsibilities:
Experience with analytic approaches to analyze large volume of data from disparate sources to uncover cybersecurity threats and fraud schemes against the organization.
Applicant must be familiar with data science and AI/ML concepts used for fraud detection. Applicant must also be comfortable working in Databricks to develop analytic solutions using Python, SQL, and R. Applicant must be able to interpret, visualize, and report on complex data to stakeholders at all levels, and respond to ad hoc requests from stakeholders to investigate potential concerns.
Applicant will be responsible for working across business units to identify, collect, aggregate, and analyze new data sources to advance the team’s mission and reduce the time needed to deliver analytical insights. Applicant will also be responsible for highlighting and analyzing gaps in client systems and processes, as well as recommending remediation solutions to more effectively deter cybersecurity threats and fraudulent activity.
Required skills:
Develop and implement analytic approaches to detect fraudulent transactions and cybersecurity threats to the organization.
Ability to perform data analysis using a variety of programming languages, including Python, R, and SQL.
Familiarity with database and big data platforms, including Databricks, Splunk, and Oracle.
Knowledge of cybersecurity
Ability to collect, aggregate, and analyze large and complex data sources from many systems.
Develop supervised and unsupervised AI/ML approaches to uncover complex patterns in data.
Develop visualizations, reports, and dashboards in Databricks, Splunk, and/or PowerBI to effectively convey data insights.
Develop and manage ETL pipelines in Databricks to improve efficiency in analyzing and query data.
Identify gaps in systems and processes, analyze potential impact, and recommend remediation solutions.
Collaborate with stakeholders across USPIS to understand fraud schemes, identify and collection relevant data, and share analytic insights to improve awareness of fraudulent activity across the organization.
Have strong communication and collaboration skills, both oral and written, with excellent interpersonal and organization skills.
Assist and/or train others on data products, fraud schemes, cybersecurity threats, or analytic solutions.
EXPERIENCE LEVEL:
5-7 years of experience with security operations and incident response
EDUCATION:
Bachelor's OR Master's Degree in Computer Science, Information Systems, or other related field.
CERTIFICATIONS:(One or more required)
One or more of the following Certification(s): CISSP, CISA, CISM, GIAC, RHCE.
Additional Provisions:
Pass a client mandated clearance process to include drug screening, criminal history check and credit check.
Once candidate’s resume is approved and interview passed, the agency is responsible for providing drug screening. Failure to submit the drug screening results will delay the security clearance process.
If a candidate is given an interim clearance, continuation of employment is then based on the candidate receiving a sensitive clearance.
All candidates must be a US Citizen or permanent status Green Card holder.
Cannot have more than 6 months travel outside the United States within the last five years. Military Service excluded. (Exception does not include military family members.) • All overtime must be pre-approved in writing by the client manager or his/her designated representative.
Agency will not be reimbursed for overtime charges without previous written authorization. Authorized overtime will be reimbursed at straight time.