We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Intelligence Analyst (Cyber) - TS/SCI Required

LMI Consulting, LLC
tuition reimbursement, flex time
United States, D.C., Washington
Dec 22, 2024

Intelligence Analyst (Cyber) - TS/SCI Required
Job Locations

US-DC-Washington


Job ID
2024-11439

# of Openings
1

Category
Intelligence



Overview

LMI is seeking a skilled Intelligence Analyst (Cyber) with a concentration in Cyber Healthcare and Public Health at our client facility in Washington, DC as needed. Top Secret/Sensitive Compartmented Information (TS/SCI) clearance is required.

LMI is a consultancy dedicated to improving the business of government, drawing from deep expertise in advanced analytics, digital services, logistics, and management advisory services. Established as a private, not-for-profit organization in 1961, LMI is a trusted third party to federal civilian and defense agencies, free of commercial and political bias. We operate completely free of political and commercial bias, and we are entirely aligned with the goals of our clients. Our clients value our specialized services in logistics, intelligence, homeland security, health care, and energy and environment markets. We believe government can make a difference, and we seek talented, hardworking people who share that conviction. We offer a generous compensation package with excellent benefits that start the first day of employment. Business casual dress, flex time, and tuition reimbursement are a few of our many work-life benefits available to our employees. LMI is The Washington Post's Top Work Places in 2021!



Responsibilities

    Analyze cyber threat data across all available verticals/threat sources, including the MCM research, manufacturing, distribution, as well as proprietary data collection tools.
  • Analyze and disseminate healthcare-specific threat data and breached medical/healthcare industry data and disseminated digital exposure assessments, both within the government and external.
  • Provide Senior Leadership with the information required to make informed decisions and assume risks while still accomplishing our critical mission.
  • Review open-source reporting to include industry standard cybersecurity sources and closed source reporting to identify new cyber threats, including software vulnerabilities, malware, and schemes leveraged by malicious actors.
  • Develop products, briefings, summaries, executive reporting, and other materials necessary to disseminate information gathered to internal and external stakeholders.
  • Ingest indicators of compromise (IOC) from a variety of providers and formats on a continuous flow whilst categorizing and prioritizing those especially critical or relevant to the healthcare industry.
  • Enrich threat information with novel details and context on a scale proportional to the flow of information with a focus on finding connections to the healthcare industry and its critical infrastructure.
  • Maintain dossiers or knowledge base on threat actors and attack campaigns - to include associated entities, link analysis, and Tactics Techniques, and Procedures (TTPs) - in a manner that makes unstructured or uncategorized information usable.
  • Perform analysis on a technical level to determine indicators, develop security tool signatures, and help uncover TTPs.
  • Document insights as it pertains the healthcare industry from past and current security incidents regardless of the sector.
  • Be available, upon request of the government, to participate in any active investigation and to be prepared to contribute all applicable threat intelligence and cyber domain expertise it possesses.
  • Participate in information sharing through automated sharing of IOCs and industry workgroups and provide machine readable outputs for integration into other platforms.
  • Conduct production and analysis in a structured format, using routine analytical frameworks derived from general all-source intelligence methodologies and augmented with technical knowledge of the threat landscape.
  • Support due diligence efforts including assessment and risk rating of the supplier, manufacturer, and distributor based on the risk.
  • Coordinate and collaborate interagency partners for possible fraud/criminal activities identified and counterintelligence support.
  • Actively monitor manufacturers, suppliers, and distributors of vaccine/therapeutics and health care supplies/equipment for potential cyber related disruptions.
  • Prepare threat assessments and briefings.
  • Maintain personal and organizational interactions to enhance stakeholder relations and actively promote rapport with customers.
  • Draft, review, staff, file, and update a variety of documents (e.g., memorandums, information papers, presentations, issue papers, meeting minutes, etc.).
  • Deliver senior-level presentations and briefings.
  • Coordinate (i.e., prepare the meeting announcement, agenda, and presentation materials), participate in (i.e., provide verbal comment/recommendation concerning technical and management matters), and follow-up (i.e., develop meeting minutes and after-action correspondence for government review and approval) for all meetings.
  • Train supporting partners on cyber security risk management practices and process, in coordination with key coordinating offices.


Qualifications

  • At least 4-7 years of experience in a relevant field or work enviornment.
  • Experience in collection, analysis, and enhancement of cybersecurity intelligence, with the goal of improving the knowledge, responsiveness, and effectiveness of cybersecurity teams within the Healthcare and Public Health (HPH) sector and the government.
  • Experience responding to attacks on the HPH sector and preparing the sector for new threats requiring collaboration across key HPH stakeholders.
  • Experience and knowledge of HPH systems, partners, and relationships.
  • Experience conducting open-source research and analysis of cyber security considerations for mission-critical HPH capabilities and functions.
  • Experience sufficient to have the ability to identify HPH cyber risks and recommend risk mitigation.
  • Strong proficiency in Microsoft Office applications, including Word, PowerPoint, Excel, and Outlook.
  • Working knowledge of remote/virtual meeting environments such as Zoom, Microsoft Teams, and WebEx.
  • Ability to comprehend threats and vulnerabilities to HPH sector systems, critical assets, and infrastructure.
  • Strong organizational skills (e.g. time management, communication, setting goals, delegation, working under pressure, self-motivation, analytical thinking, attention to detail).
  • Exceptional proficiency in written and oral communications.

The salary maximum on this position is up to $100,000.



LMI is an Equal Opportunity Employer. LMI is committed to the fair treatment of all and to our policy of providing applicants and employees with equal employment opportunities. LMI recruits, hires, trains, and promotes people without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, pregnancy, disability, age, protected veteran status, citizenship status, genetic information, or any other characteristic protected by applicable federal, state, or local law. If you are a person with a disability needing assistance with the application process, please contact accommodations@lmi.org
Colorado Residents: In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Need help finding the right job?

We can recommend jobs specifically for you!
Click here to get started.
Applied = 0

(web-86f5d9bb6b-jpgxp)