Cyber Threat Analyst in Washington, DC at APEX Systems

Date Posted: 7/9/2018

Job Snapshot

  • Employee Type:
  • Job Type:
  • Experience:
    Not Specified
  • Date Posted:

Job Description

Job #:  847200

Role: Cyber Threat Analyst 

Location: Washington, DC

Schedule: 40 hours / week

If interested in applying for this position, please send your resume and best method of contact to Caroline Elbertson at or call at 703-256-2000

Overview: Apex Systems, the nation’s second largest IT staffing and technology services firm, has an immediate opening for a Cyber Threat Analyst to sit on-site in Washington, DC.  

Duties and Responsibilities

The ideal candidate will work as part of a broader team of intelligence assets, feeding operational and strategic components the necessary indicators to pivot from, to develop threat intelligence reporting.

Required Skills

  • Strong understanding and experience with Splunk, Nessus, and other network monitoring tools
  • Knowledge and understanding of intelligence tradecraft, processes, and tools to perform open source research and analysis, as well as at a higher level
  • Strong understanding of IOCs and collection methods
  • Experience working with or for Federal agencies

Desired Skills

  • Strong understanding of indicators of compromise (IOC) and highly granular tools, techniques, and procedures
  • Ability to coordinate with and articulate to the client how an adversary deploys and utilizes their capabilities
  • General knowledge and understanding of host based artifacts generated during exploitation and installation
  • Strong understanding of netflow and the ability to identify unusual activity occurring on the network
  • Works well in team setting to coordinate and support operational and strategic intelligence counterparts
  • Strong understanding of malicious adversaries, threat groups, and campaigns
  • Ability to produce intelligence reporting and threat assessments
  • Ability to analyze, articulate, coordinate, and support threat remediation actions to client and client staff
  • Utilize structured analytic techniques to develop tailored intelligence products and provide threat warning notifications to our client’s decision-makers, regionally and globally
  • Gather and analyze data to facilitate improvements in the methodologies, tools and techniques to enable the team to scale and optimize operations to mitigate potential risk
  • Advise client’s managers on cyber-security events; determines the nature and scope of the event/incident, and classifies the severity and priority of the incident
  • Assist the components with decisions that affect security of their systems and networks.
  • Knowledge of Splunk content
    • Assist in the proper operation and performance of Splunk, Loggers and connectors
    • Integration of data feeds (logs) into Splunk. 
    • Will coordinate with SOC/JSOC and assist with advanced issue resolution across the enterprise

Minimum qualifications:

  • 8 years’ experience providing support to plan, coordinate, and implement the organization’s information security. Providing support for facilitating and identifying current security infrastructure and define future programs, design and implementation of fire-wall and other related security issues on LANs/WANs.
  • 8 years’ experience working of several of the following areas is required: understanding of business security practices and procedures; knowledge of current security tools available; hardware/software firewalls and there implementation; different communication protocols; encryption techniques/tools; familiarity with commercial products, and current Internet/EC technology. Includes operators at the Security Operations Center (SOC) using tools such as Splunk, ProofPoint, FireEye, Fidelis.
  • 3 years’ experience working with software packages:  Splunk, network traffic analysis (PCAP) and monitoring security tools (ProofPoint, FireEye, Fidelis)

Preferred Qualifications

  • 12 Years’ experience and a Bachelors in Science in Information Technology or Cyber Security
  • Certified Information Systems Security Professional (CISSP) - maintained and current
  • Experience with DISA STIG configuration requirements
  • Experience with Department of Justice information systems.
  • Experience with the use of the DOJ CSAM application.
  • Security Tool experience (e.g. Splunk, FoundStone, Nessus/Tenable, DBProtect, AppDetective, Tivoli/BigFix, Sharepoint, Guardium, WebInspect).

•Candidates must be US citizens and able to obtain and/or maintain a Department of Defense TS/SCI security clearance as a condition of employment 


Education Requirements:

Bachelor’s Degree in Computer Science, Engineering or a related technical discipline.



***As a contract employee of Apex Systems, you are eligible for Health, Dental, Vision and Life Insurance; Shorter Term Disability; Hospitalization Coverage; Direct Deposit; Weekly Pay Periods; Training and Development Programs; Corporate Discounts / Perks and our Referral Program.


***Apex Systems is an Equal Employment Opportunity / Affirmative Action Employer. We evaluate qualified applicants without regard to race, color, religion, sex, national origin, disability, veteran status, and other protected characteristics.









EEO Employer

Apex is an Equal Employment Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other characteristic protected by law. Apex will consider qualified applicants with criminal histories in a manner consistent with the requirements of applicable law. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation in using our website for a search or application, please contact our Employee Services Department at or 844-463-6178.