Navy Federal Credit Union Supervisor, Cyber Threat Intelligence and Countermeasures in Merrifield, Virginia

Employee Perks

Why You Will Love Being Part of the Navy Federal Team:

Competitive compensation with opportunities for annual raises, promotions, and bonus potentialBest-in-Class Benefits! (7% 401k match / Pension plan / Tuition reimbursement / Great insurance options)On-site amenities include fitness center, wellness center, cafeteria, etc. at Pensacola, FL; Vienna, VA and Winchester, VAcampusesConsistently Awarded Top WorkplaceNationally recognized training department by TRAINING MagazineAn employee-focused, diverse, and service-oriented workplace environment

Basic Purpose

The Supervisor for Cyber Threat Intelligence & Countermeasures provides operational and tactical oversight to the cyber threat intelligence function of the Navy Federal Cybersecurity Operations Center (CSOC). The Supervisor will work closely with the CSOC Manager to define the strategic vision for the team and help build an intelligence-driven computer network defense program. The Supervisor provides leadership, guidance, and technical expertise on a day-to-day basis and ensures available intelligence is processed in a timely manner. The Supervisor will work closely with additional teams of information security analysts and engineers to protect Navy Federal’s brand, data, and IT assets from cyber-based threats.Responsibilities:Oversee the cyber threat intelligence function supporting both employees and a growing customer member base from cyber threats. Primary responsibilities include:• Build and implement a cyber threat intelligence program to include the development of analytic standards and overall strategy.• Develop a catalog of intelligence products for a diverse stakeholder audience to include tactical and strategic reports, and threat briefings.• Develops and refines intelligence requirements to drive collection, processing, analysis and dissemination of cyber threat information.• Develop and establish operational metrics and reporting based on Key Performance Indicators (KPI's).• Support the Incident Response & Monitoring team in the effective detection, analysis, containment, and eradication of malicious activity.• Manage day-to-day activities to include cultivating intelligence sources, analyzing information, creating intelligence, proactively searching for exposures or related incidents, and providing advanced threat analysis for security events.• Implement traditional intelligence analysis/research methods and utilize various tools to proactively address cyber threats.• Provide guidance in the development and maintenance of Standard Operating Procedures and similar documentation.• Escalating issues to management in a timely manner with appropriate information regarding risk and impact.• Manage team personnel to include performance management and professional development, and provide leadership, guidance, and technical expertise on a day-to-day basis.• Collaborate with industry partners and internal lines of business to discover and analyze threats.• Execute ad-hoc tasks or lead small projects as needed.Qualifications:Candidates must possess:• Expert-level understanding of the intelligence cycle, analytical tradecraft, threat modeling, and research methodologies.• Previous experience building out an operational capability, preferably within a cyber-related function.• A strong understanding of the current threat landscape and adversary tactic, techniques and procedures (TTP's).• A strong desire to solve challenging and complex problems.• Strong deductive reasoning and critical thinking abilities.• Experience with CND-based analytical frameworks (e.g., Cyber Kill Chain, Pyramid of Pain, MITRE ATT&CK, etc.).• Experience using and evaluating external intelligence enrichment sources (e.g., DomainTools, VirusTotal, Passive Total, etc.).• Experience delivering senior leader presentations and written products.• Excellent verbal and written communication skills to include the ability convey technical details in a clear and understandable manner to both, technical and non-technical audiences alike.• Previous supervisory or management experience over a technical team.• Strong leadership qualities to include the ability to team-build, lead, mentor, and motivate others.• The ability to foster team work and collaboration across operational teams.• Strong planning and organizational skills for the purposes of prioritizing tactical/strategic initiatives and achieving goals.Desired:• Previous experience within the financial sector.• Traditional Intelligence Community (IC) background.• Experience in dark/deep web research, insider threat, threat hunting, forensics, and malware analysis.• Experience with Splunk or other big data analytic platforms.• Experience with analysis tools such as Palantir, Analyst Notebook, and Maltego.• Preferred Certifications - GIAC (e.g., GCIH, GCIA, GCFA, etc.), CEH, CISSP, or Security+.Hours:Monday-Friday, 8:00AM-4:30PM (as business need dictates)Note: Candidates are expected to provide one or more writing samples.

Equal Employment Opportunity

Navy Federal values, celebrates, and enacts diversity in the workplace. Navy Federal takes affirmative action to employ and advance in employment qualified individuals with disabilities, disabled veterans, Armed Forces service medal veterans, recently separated veterans, and other protected veterans. EOE/AA/M/F/Veteran/Disability