• Senior Insider Threat Cyber Analyst

    Job Locations US-VA-Arlington
    Job ID
    Clearance Level
    Top Secret/SCI
  • Overview

    Aveshka is seeking professionals to provide cyber and insider threat technical analysis support for a classified Department of Defense customer.  Duties include assessing and making recommendations to the government regarding insider threat policy and governance, advising the government on insider threat program best practices, integrating and maintaining commercial software tools, analyzing data, and developing and managing cases.  Ideal candidates have a mix of intelligence or threat analysis experience and technical skills related to cyber security and insider threat.



    • Lead and support an insider threat program assessment and gap analysis, which will culminate in the development of a “roadmap” that will drive further development of the government’s insider threat program.

    • Collaborate with Aveshka insider threat subject matter experts and government representatives to drive insider threat program continuous improvement.

    • Assess and make recommendations to the government regarding commercial software tools used to support and improve the insider threat program.

    • Conduct and triage anomalous events of concern using industry data loss prevention tools to include User and Entity Behavior Analytics (UEBA) and User Activity Monitoring (UAM) capabilities. Elevate anomalous events of concern.
    • Access and integrate information from agency network monitoring tools and other data analytics tools and sources to decipher underlying trends or uncover anomalies and discern obscure patterns and attributes.
    • Document Insider Threat requirements that illustrate issues on computer misuse, various violations of policies, counterintelligence concerns, foreign influence, financial stressors, threats to self or others, or Continuous Evaluation (CE) adjudicative concerns.
    • Conduct case support to investigations, administrative or security inquiries, counterintelligence risk assessments, or other adjudicative assessments, to include support to investigations involving counterespionage. Document activities in written products and reports.
    • Complete special analytical projects on topics as directed by government supervisors. Document in written products and reports.
    • Prepare and present analysis, in the form of briefings and/or reports, to government client.
    • Perform proactive inquiries and collaborate with investigative entities, IC organizations, and Law Enforcement agencies/entities, at the direction and oversight of government supervisors.


    • Develop and present weekly information system security briefings. Recommend cost effective solutions to mitigate risks within the Insider Threat IT baseline and propose recommendations for improving the information security processes/procedures.
    • Provide guidance, assistance, and coordination to systems developers, systems administrators, and other IT specialists to ensure verified and timely implementation of IT security standards.
    • Document configuration management and control the integrity of changes to all systems security documentation, including standard operating procedures and user guides that provide detailed instructions for implementing IT systems security policies.
    • Expert in implementing security management, operational and technical security controls agreed upon by the Designated Authorization Official (DAO). Assist in the implementation of these security controls necessary in establishing a baseline of measures to prevent security breaches of the information system, document the selected security controls in the security plan and initial Risk Assessment Report (RAR), and, document an approved continuous monitoring strategy in accordance with ICD-503 Risk Management Framework.
    • Manage the system development life cycle of the system to include documenting, testing and validating the security control implementation, as appropriate and manage the security plan, providing a functional description of the control implementation (including planned inputs, expected behavior, and expected outputs).
    • Experience working in Department of Defense or Intelligence Community within a cyber security program.


    Required Education:

    • Master’s Degree Desired in a Computer Related Field
    • Certified to DoD 8570.01 IAT or IAM Level III baseline requirements



    Required Experience:

    • Possess minimum of 10 years of cyber analysis experience, experience with data analytics tools and data bases (e.g. analyst notebook, etc.)
    • Applying statistics to evaluate received data
    • Analysis tradecraft enhancements through process improvements
    • Developing data visualization techniques, tactics, or procedures to enhance data analysis
    • Experience writing cybersecurity incident assessment reports


    Required Clearance:

    • Active TS/SCI
    • Willing to take CI Poly


    Desired Qualifications:


    •  CISSP preferred


    About Aveshka:

    Aveshka is a professional services firm focused on addressing our nation’s most complex threats and challenges. As a small business we’re committed to supporting our clients’ missions with services delivered by our diverse and experienced staff. With expertise in cybersecurity, emergency preparedness, and public health, our experience base spans federal, state, and local governments, as well as private sector entities.


    Aveshka encourages collaborative communication and ongoing learning.  Some of our benefits include:


    • Extensive training programs
    • Gym membership reimbursement
    • Education reimbursement
    • Technology benefits
    • Commuter benefits
    • Generous paid time off and much more!


    Aveshka is an Equal Opportunity Employer (EOE)


    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed