Be on Alert – Fraudulent Employment Offers. Learn More
Insider Threat Analyst
Performs assessments of systems and networks within the networking environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Achieves this through passive evaluations (compliance audits) and active evaluations (vulnerability assessments). Establishes strict program control processes to ensure mitigation of risks and supports obtaining certification and accreditation of systems.
This includes process support, analysis support, coordination support, security certification test support, security documentation support, investigations, software research, hardware introduction and release, emerging technology research inspections and periodic audits. Assists in the implementation of the required government policy (i.e., NISPOM, DCID 6/3), and makes recommendations on process tailoring. Performs analyses to validate established security requirements and to recommends additional security requirements and safeguards. Supports the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports. Periodically conducts of a review of each system's audits and monitors corrective actions until all actions are closed.
As the Insider Threat Analyst you will be responsible for the development of an insider threat program for the client organization. As the Analyst you will make recommendations on organizational policy, enterprise security architecture, and mitigation strategies.
Join our team of cyber pioneers with expertise and decades of experience defending and protecting some of the nation’s most valuable resources—ICF. Through implementation of effective cybersecurity solutions, ICF supports security awareness, readiness, resilience and response to cyber incidents. Our extensive customer base has benefited from the leading-edge work our security engineers and data scientists perform in maintaining and advancing situational awareness of the current cyber threat landscape.
- Develop an insider threat program for client organization.
- Develop, execute, and maintain standard operating procedures (SOPs) for the insider threat program.
- Create TTPs for identifying insider threats.
- Perform gap analysis of current security tools and make recommendations to improve the enterprise security posture
- Must have a current DOD 8570 certification prior to start: CEH, DFR, CySA+, GCIA, GCIH, GICSP, or SCYBER) and IAT II (CCNA, CySA+, GICSP, GSEC, Sec+, or SSCP
- Minimum of Seven (7) years information assurance, incident response, or cybersecurity experience.
- Ability to demonstrate strong knowledge of computer security concepts.
- Demonstrated ability to document processes and procedures
- Bachelor's Degree in Computer Science or related technical discipline, or the equivalent combination of education, professional training, or work experience.
- Initiative and a personal interest in Information Technology Security.
- People skills and the ability to communicate effectively with various clients with the ability to explain and elaborate on technical details.
- Intelligence analyst/community experience.
- Certified Information Systems Security Professional (CISSP).
- An understanding of DOD information assurance policy and regulations.
Working at ICF
Working at ICF means applying a passion for meaningful work with intellectual rigor to help solve the leading issues of our day. Smart, compassionate, innovative, committed, ICF employees tackle unprecedented challenges to benefit people, businesses, and governments around the globe. We believe in collaboration, mutual respect, open communication, and opportunity for growth. If you’re seeking to make a difference in the world, visit www.icf.com/careers to find your next career. ICF—together for tomorrow.
ICF is an equal opportunity employer that values diversity at all levels. (EOE – Minorities/Females/ Protected Veterans Status/Disability Status/Sexual Orientation/Gender Identity). For more information, please read our EEO & AA policy.
Reasonable Accommodations are available for disabled veterans and applicants with disabilities in all phases of the application and employment process. To request an accommodation please email firstname.lastname@example.org and we will be happy to assist. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. Read more about non-discrimination: EEO is the law and Pay Transparency Statement.
Maryland Client Office (MD88)