What are the responsibilities and job description for the Cyber Threat Analyst position at The Amatriot Group?
5 Year DoJ Contract | Chantilly, VA
Amatriot is seeking a Cyber Threat Analyst to support a Cyber Technical Analysis Unit in
analyzing cyber intrusion activity, digital communications, and host/network forensic artifacts in
support of DoJ mission operations. This role is focused on cyber threat analysis, intrusion
investigation, host-based forensic analysis, network traffic analysis, and attribution support
within a highly sensitive operational environment. The ideal candidate will possess experience
analyzing Splunk data, conducting host and network forensic analysis, and utilizing industrystandard
forensic and cyber analysis tools to identify malicious activity, recover artifacts, and
support investigative operations.
Responsibilities
unauthorized access.
compromise.
lead generation.
procedures (TTPs).
Required Skills & Experience
in lieu of years of experience
Amatriot is seeking a Cyber Threat Analyst to support a Cyber Technical Analysis Unit in
analyzing cyber intrusion activity, digital communications, and host/network forensic artifacts in
support of DoJ mission operations. This role is focused on cyber threat analysis, intrusion
investigation, host-based forensic analysis, network traffic analysis, and attribution support
within a highly sensitive operational environment. The ideal candidate will possess experience
analyzing Splunk data, conducting host and network forensic analysis, and utilizing industrystandard
forensic and cyber analysis tools to identify malicious activity, recover artifacts, and
support investigative operations.
Responsibilities
- Process, evaluate, and analyze digital network communications and cyber threat data to
- Conduct cyber intrusion investigations and end-to-end kill chain analysis across host and
- Perform host-based forensic analysis leveraging Splunk and standard forensic toolsets
unauthorized access.
- Analyze packet capture (PCAP) and NetFlow data to identify malicious communications,
compromise.
- Correlate digital artifacts including IP addresses, URLs, malware indicators, system logs,
lead generation.
- Analyze encrypted and plaintext credentials, registry artifacts, rootkit activity, commandline
- Draft detailed technical reports and analytical findings based on cyber investigations
- Support development and refinement of cyber analysis processes, CONOPS, SOPs,
- Conduct open-source and intelligence community research to maintain awareness of
procedures (TTPs).
- Collaborate with internal teams and mission partners across the intelligence community
- Provide operational updates and analytical findings to leadership and investigative
Required Skills & Experience
- Active Top Secret Clearance required, with willingness and ability to obtain a Counter
- BS/BA degree with 5 years of relevant experience or 9 years with no degree. Advanced
in lieu of years of experience
- Experience performing host-based forensic analysis utilizing Splunk.
- Experience analyzing network traffic, packet capture (PCAP), and NetFlow data.
- Hands-on experience with industry-standard forensic tools such as:
- Splunk
- EnCase
- Magnet AXIOM
- X-Ways Forensics
- Understanding of cyber intrusion methodologies, attacker kill chains, malware behavior,
- Experience correlating threat indicators and investigative data to support attribution and