Warrenton, Virginia16 days ago
Identify and leverage new threat-based frameworks and methodologies for analyzing adversaries’ activities based on network and system vulnerabilities, adversary tactics, techniques, and procedures (TTPs), (e.g., scanning, unsuccessful attempts, malware, phishing campaigns, privilege escalation, user and root-level intrusions, lateral movement, and data exfiltration). Research and analyze open source and classified reporting to identify current and emerging threat trends and work with cyber community and Intelligence Community partners to produce and offer threat intelligence products and briefings to internal and external partners and stakeholders.