Returning Candidate?

Cybersecurity Analyst

Cybersecurity Analyst

Job Location 
# of Openings 
Security Clearance 
Active Top Secret SCI
Percentage of Travel Required 
Regular Full-Time

More information about this job


Provide cyber analytical support and information to enhance the program in the protection of the programs information.


  • Act as an incident “hunter”, preemptively acting rather than waiting for escalated incidents
  • Be closely involved in the development, tuning, and implementation of threat detection analytics
  • Research and evaluate technical and cybersecurity intelligence to develop in-depth analysis and assessments on threats to FDA critical networks and infrastructure
  • Conduct classified and open source research to develop in-depth analysis and assessments on threats to FDA network infrastructure and information
  • Review, analyze, and correlate global, network/security incidents from multiple systems (i.e. Splunk, Nessus, Web Inspect) to identify cyber threats and vulnerabilities that may impact the public health mission
  • Advise government managers on cybersecurity events as well as counterintelligence and insider threat activities
  • Operate the Homeland Secure Data Network (HSDN) systems to support IT security and cyber operations
  • Provide intelligence-driven recommendations and support that improves the program and meets national security objectives
  • Produce targeted cyber threat intelligence briefings/products for consumption by network analyst, technical and senior leadership audiences
  • Support malware and forensic analysis efforts in support of cybersecurity examinations, incident response and the overall strengthening of the cybersecurity posture
  • Maintain a high level of enterprise situational awareness regarding emerging threats, threat actors, and exploitation techniques
  • Conduct cyber intelligence analysis and, in coordination with the Systems Management Center (Cyber Ops), Advanced Forensics/Insider Threat, and Threat/Vulnerability Management Teams, develop understanding of the potential intent, objectives, and activities of cyber threat entities (foreign intelligence, other external actors, and insider threats)
  • Support the identification of security vulnerabilities, gather remediation requirements, and recommend appropriate solutions
  • Support creation and maintenance of a dashboard that includes threats, vulnerabilities, and other cyber and/or security related information
  • Advise government managers on cybersecurity events; triage potential incidents, determine the nature and scope of the event/incident, and classify the severity and priority of the incident.
  • Produce and present monthly cybersecurity analysis and situational awareness reports
  • Provide expert advice and support of security tools and other scanning capabilities
  • Provide recommendations to management related to cyber security risk management and incident response
  • Assist in the development and tracking of key performance indicators, balance scorecard, and other metrics for measuring operational outcomes
  • Assess current and planned security architectures against information to determine potential Advanced Persistent Threats


  • Education:
    • Bachelor’s in related field or additional years of experience
  • Required Knowledge/Experience:
    • Minimum three years’ experience evaluating cybersecurity threat actors, capabilities and techniques to determine appropriate controls, tactics and techniques to remediate/mitigate known or perceived threats
    • Possess DoD Intelligence background with experience in All-Source intelligence (Classified/OSINT) analysis and reporting
    • Hands on Dark/Deep web experience
    • Possess in-depth knowledge of 2 or more of the following minimum:
      • Network
      • Endpoint
      • Threat intelligence
      • Forensics
      • Malware reverse engineering
    • Understand the functioning of specific applications or underlying IT infrastructure
    • Possess advanced training on anomaly-detection
    • Have tool-specific training for data aggregation and analysis and threat intelligence
    • Experience providing enterprise network cybersecurity
    • Experience providing support to United States intelligence agencies
    • Knowledge in cybersecurity intelligence and operational analysis, including research, correlation, reporting, and dissemination of classified and unclassified products
    • Operational knowledge of U.S. intelligence processes, cycles, and organizations
    • Experience in analyzing network/security incidents
    • Experience analyzing malware
    • Experience with digital forensics analysis
    • Experience reviewing and operationalizing Indicators of Compromise including active Advanced Persistent Threats (APT) presence

Other Responsibilities

  • Perform other tasks consistent with the goals and objectives of the department/contract
  • Perform other duties as assigned by Sr. Program Executive

Invest in a company that invests in you! Copper River provides its employees with ample opportunities for career growth and development. Tuition reimbursement is offered to help employees further their education and skillset. Other perks include Open Leave, 401k matching with immediate vesting, Medical, Vision, and Dental coverage.


EEO/AA Employer Minorities/Females/Vets/Disability


Disclaimer: The above statements are intended to describe the general nature and level of work performed by employees assigned to this classification. They are not intended to be construed as an exhaustive list of all responsibilities, duties and skills required of personnel so classified.