Oversee the design of the operational effects as described by the Government
Evaluate alternatives and provide well-informed recommendations on technical options for design and development
Translate mission requirements into a variety of software products, evolutionary prototypes, and advanced countermeasure capabilities
Identify optimal methods for aggregating, storing, correlating, and visually depicting various types of data
Advise on data preparation, implementation of techniques, visualizations, and employment of analytics developed by ICF and customer partners
Assess current use of cyber tools by analysts and assess whether efficiencies can be made via alternate use of current or adoption of alternate tools
Problem-solve by identifying potential tools/processes to support needs by capturing areas of improvement that can be translated into functional requirements for future planning
Identify areas of technical training gaps and proposed approaches to methods (hands on, online modules, etc.) to improve the use of tools and data in support of the cybersecurity mission.
Participate in post-engagement review
Effectively communicate with leadership to ensure awareness of progress and/or challenges
Requirements
Bachelor’s degree with 12+ or Master’s degree with 10+ years of experience in IT, Cyber, Engineering, or a related field
5 or more years of implementing custom and high-impact security platforms in critical program areas.
A minimum of 5 years of experience with advanced cyber threats, tools, techniques, and processes (e.g., Threat Hunt, Incident Response, Investigations, Technical Reporting, etc.)
5 years of experience using network security analysis/IDS tools is required
5 or more years of experience analyzing packet capture and NetFlow data with an understanding of current cyber threats and trend derived from multiple sources (e.g., open-source, intelligence products, etc.)
Position requires a minimum of 5 years of experience with a different types of Malware including detection methods, attack vectors, and vulnerabilities used
Experience with query languages (e.g., SQL, KQL, etc.)
Experience with different cybersecurity frameworks and knowledge bases to identify tactics, techniques, and procedures of known actors
Understanding of mathematics behind machine learning algorithms
Working knowledge of open-source distributed massively parallel processing databases such as GreenPlum and open-source big data technologies such as Apache Hadoop, Apache Kafka, etc.
Active security clearance required as part of client contract requirements
US Citizenship required as part of client contract requirements