Department of Homeland Securityother related Employment listings - Idaho Falls, ID at Geebo

Department of Homeland Security

The Department of Homeland Security (DHS) is recruiting professionals to support a range of technical roles in Cybersecurity Threat Analysis, including Cybersecurity Intelligence Analyst, Cybersecurity Threat Analyst, and Cybersecurity Adversary Analysis Expert.
All positions are in the DHS Cybersecurity Service.
There are a variety of Cybersecurity Threat Analysis opportunities across the Department, including supporting several specialized programs at the DHS Office of Strategy, Policy, and Plans (PLCY), Cybersecurity and Infrastructure Security Agency (CISA), DHS Office of the Chief Information Officer (OCIO), and Federal Emergency Management Agency (FEMA).
Depending on your career level and role, DHS Cybersecurity Service employees in the Technical Career Track, with a technical capability in Cybersecurity Threat Analysis, will generally apply their expertise to perform a range of tasks, including:
Assisting others who are less seasoned in identifying and analyzing cybersecurity threats to determine consequences and potential impacts on DHS and national infrastructures and develop mitigation strategies.
Actively performing code analysis, advanced traffic analysis, web log analysis, and pattern analysis to determine trends, patterns and suspicious activity on DHS, DHS Component, and/or DHS stakeholder networks.
Tracking technical network and host-based attack vectors, malicious actors, emerging cyber threats, new vulnerabilities, and current trends to prepare and present customized cyber threat intelligence briefings to a range of specific target audiences across DHS, Federal Government, and/or private industry.
Providing key technical input to assist organizational leaders with decision-making and actions related to a variety of critical cybersecurity threats and providing strategic-level analysis to support broader DHS cyber missions and related future planning.
Contributing to or serving as a technical subject matter expert on Departmental, Component, and/or Federal working groups, task forces, and committees to develop, share or otherwise contextualize cyber indicators or information, recommending countermeasure or mitigation strategies for perceived threats.
Applying Intelligence Community (IC) standards to analyze all-source intelligence on current and emerging cyber threats and sharing these analyses with DHS customers and partners.
Producing intelligence assessments and cyber warning assessments using analytic tradecraft and tools encompassing the full threat intelligence lifecycle (planning, collecting, processing, analyzing, disseminating) to identify and evaluate emerging threats.
Monitoring DHS or Component architectures, networks, communications, applications, and systems by mining open source and classified data sources to maintain constant awareness of national and international cyber events/threats.
Actively working with Cyber Incident Response teams and cyber experts to implement advanced identification and protection measures against state sponsored threats, sharing intelligence and analysis.
Performing advanced scanning and probing activities to analyze and interpret all-source intelligence on current and emerging cyber threats using intelligence community analytical standards.
Advising Federal and National DHS stakeholder organizations on handing highly complex cybersecurity threats and influencing policy decision making on a range of technical topics within and outside DHS.
Leveraging collaborative networks of internal and/or external DHS partners and/or national technical experts to facilitate achievement of strategically important DHS and national cybersecurity goals.
Serving as a teacher and technical mentor to DHS cybersecurity employees in applying Intelligence Community (IC) standards to analyze all-source intelligence on current and emerging cyber threats.
This position is in the Technical Track across a range of career levels.
Employees in this career track generally:
Have between 5-15 years of cybersecurity work experience.
Range from experienced cybersecurity professionals who apply technical expertise and independent judgement to perform cybersecurity work - to - recognized Federal cybersecurity technical authorities with uncommon technical expertise who advise on cybersecurity challenges impacting DHS and the Nation.
DHS Cybersecurity Service employees with a technical capability in Cybersecurity Threat Analysis will generally:
Collect, analyze, and report on cybersecurity threats and threat actors to support operations.
Understand and analyze different sources of information (e.
g.
, INTs, open source, law enforcement data) on specific topics or targets.
Provide tactical/operational analysis, including attribution of cyber actors using a variety of analytic techniques and tools.
May also provide strategic-level analysis to support broader mission.
Develop and communicate situational awareness of local, regional, and international cybersecurity threats impacting stakeholder missions and interests.
DHS Cybersecurity Service employees start at career levels and salaries matching their experience and expertise.
To learn more about DHS Cybersecurity Service career tracks and levels, visit our application portal.
This position is focused on Cybersecurity Threat Analysis.
DHS Cybersecurity Service jobs are structured cybersecurity specializations - called technical capabilities.
To learn more about technical capabilities, visit our application portal.
About the Company:
Department of Homeland Security.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.