• Strategic Threat Intelligence Unit Specialist

    Job Locations US-NC-Morrisville
    Posted Date 3 days ago(7/17/2018 2:22 PM)
    # of Openings
    Information Technology
  • Overview

    NikSoft Systems Corporation is a recognized Information Technology solutions provider. Founded in 1998 and based in Reston, Virginia, NikSoft is a CMMI Level 3 Certified company with an established reputation for excellence and on-time delivery with a consistently high customer satisfaction rating from its Federal Government and private consulting contracts.


    Seeking a professional and experienced Strategic Threat Intelligence Unit Specialist to join our team. Identifies and assesses the capabilities and activities of cyber criminals or foreign intelligence entities; produces finds to help initialize or support law enforcement and counterintelligence investigations or activities.


    • Develop and brief threat reports, to include strategic threat posture, threat actor strategy and cyber situational awareness.
    • Keeps current on evolving and emerging technologies that may involve multi-disciplined intelligence and/or evoke new threats and interfaces with other organizations to maintain situational awareness, stay ahead of future threats and leverage best practices.
    • Applies expert knowledge of the nexus between Cyber Counter-Intelligence and other Intelligence operations (i.e., How/ Where/ When Cyber Counter-Intelligence fits in, etc.).
    • Analyzes and synthesizes information with other relevant data sources to develop a common operational picture of criminal and foreign threats to information infrastructure.
    • Fuses computer network attack analyses with criminal and counterintelligence investigations and operations, promotes joint operations, and shares best practices with other members of the intelligence community.
    • Develops models for identifying incident-type activity, of malware or bad actors, using statistical analysis
    • Develop intelligence type dashboards to assist in automation and awareness for incident response
    • Reviews incident logs/records mining for patterns
    • Conducts extensive research of internet sources and threat intelligence databases to ascertain and find evidence in customer logs
    • Explores patterns in network and system activity through log correlation using Splunk and other tools


    • Extensive experience (5+) years working in the areas of (intelligence, information security, network forensics, insider threat).
    • Must possess a minimum of a Bachelor’s Degree in Computer Science, Information Technology or Information Security. Master’s degree is preferred.
    • Desired certification in one or more of; Certified Information System Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Any Global Information Assurance Certification (GIAC), or Red Hat Certified Engineer (RHCE).
    • Demonstrable experience with Security Operation tools inclusive of products from SPLUNK, FireEye, Looking Glass, Intel, Endgame, StealthWatch, RSA, Tanium and Anomali.
    • Familiarity with common network vulnerability/penetration testing
    • An understanding of log data for Sourcefire, Blue Coat, and Tipping Point
    • Understanding of intelligence cycle, Cyber Kill Chain, and Diamond Model

    ** US Citizenship status and Active DoD Secret Clearance (preferred but not required), must successfully complete the government’s security process (required) **




    NikSoft’s competitive benefits program includes comprehensive medical and dental care, matching 401K, paid time off, flexible spending accounts, disability coverage, and other benefits that help provide financial protection for you and your family.


    NikSoft Systems Corp is fully committed to the concept and practice of equal opportunity and affirmative action in all aspects of employment.  NikSoft is an EOE M/F/Disability/Veteran employer. For more information about our other openings, please visit



    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed