UIC Alaska

Cyber Security Analyst

Cybersecurity/Information Security
Location : Location
Minimum Clearance Required
Top Secret/SCI
Travel Requirement
Less than 10%


Bowhead seeks an experienced Cyber Threat Analyst to join our team in Vicksburg, MS. The Cyber Security Analyst will be responsible for monitoring, tracking and reporting relevant events, types and sources to the correct departments. This highly skilled individual will work in various capacities alongside Computer Network Defense (CND) Incident Responders and Cybersecurity Engineers. The Cyber Threat Analyst will be responsible for applying technical and functional expertise to collect, normalize and characterize cyber incident and event data to identify anomalous or malicious activity including intrusions, attacks, data loss or other prohibited activities. The Cyber Threat Analyst will analyze and correlate incidents and events that may involve foreign intelligence entities and warn of anticipated hostile attacks against DoD information systems or networks. 


  • Receive and initial analysis on warning intelligence information and proper sharing of intelligence notifications, notes and reports with customers.
  • Identify potential impact to customers by analysis of intelligence reports, forensic reports and reverse engineering of malware reports to determine associated indicators of compromise (IOC's) and using the IOCs to develop and distribute countermeasures to detect and prevent identified threats.
  • Evaluation of IOCs from incidents to determine association with known computer network exploitation (CNE) groups and thoroughly investigate the IOCs for other infrastructure possibly related to the CNE teams (domain registration, IP ownership, VPN infrastructure, strains of malware, etc.) for the possible addition of proactive defensive measures.
  • Will assist customers in preventing or mitigating the potential impact of cyber-attacks by developing, distributing and sharing countermeasures that may impact networks and information systems with peer DCO organizations and customers.


  • A BS/BA degree in Computer Science or related field is required
  • Must have a minimum of a CompTIA Security+ certificate to start-will be required to obtain a Certified Ethical Hacker (CEH) certificate within 90 days of starting
  • A minimum of five (5) years of Linux and Networking experience, three (3) years' experience with IDS, IPS and Host Based Security Solutions and two (2) years of experience with malware analysis tools (such as IDA Pro, Cuckoo Sandbox, OllyDbg) is required
  • Must have demonstrable, strong programming skills-specifically in Python and C/C++
  • 2+ years of Python programming experience
  • Intermediate to advanced level skills in Microsoft Office software suite - Word, Excel, Outlook, PowerPoint
  • Ability to communicate effectively, interpret regulatory guidance and identified vulnerabilities to a wide audience
  • Presentation and strong public speaking skills are required
  • Strong interpersonal skills and good judgment with the ability to work alone or as part of a team

SECURITY CLEARANCE REQUIRED: Must currently hold a security clearance at the Top Secret/SCI level.


Physical Demands:
• Must be able to lift up to 25 pounds
• Must be able to stand and walk for prolonged amounts of time
• Must be able to twist, bend and squat periodically




Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed