Home >
Career Center > Job Seekers
> Job Search
| Company Name: |
General Dynamics IT |
| Location: |
Herndon, VA |
| Position Type: |
Full Time |
| Post Date: |
05/19/2026 |
| Expire Date: |
06/18/2026 |
| Job Categories: |
Engineering, Information Technology |
|
 |
|
Cyber Threat Intelligence & Data Manager, Top Secret
The Cyber Threat Intelligence & Data Management Lead oversees teams that collect, process, organize, and analyze cyber threat data transforming it into actionable intelligence that informs decisionmakers and strengthens national cyber defense. In this role, the successful candidate governs TIP data quality and tagging, manages the intelligence production cycle, and drives targeted notifications, RFIs, dashboards, and eventdriven reporting that enhances threat visibility and mission impact. The candidate directs operations within a threat intelligence platform (TIP), ensuring analysts can receive, share, enrich, correlate, and disseminate timely intelligence to reduce cyber risk across various agencies to such as, FCEB agencies, SLTT partners, and critical infrastructure sectors. Key Responsibilities Cyber Threat Intelligence (CTI) Operations LeadershipOversee teams delivering strategic, operational, and tactical CTI productsEnhance national situational awareness by directing monitoring, aggregation, and correlation of cyber incident reportsSustain realtime CTI exchange by coordinating with internal components, FCEB agencies, and external partners to maintain an accurate, timely, and shared threat picture across the full threat lifecycle.Detect and characterize threats by continuously monitoring intelligence, media, law enforcement, and thirdparty data feeds within the TIP to identify incidents, vulnerabilities, and malicious activity. TIP & Data Management GovernanceEnsure continuous, reliable operation of the TIP by managing ingestion pipelines, maintaining data quality, and sustaining platform performance .Operate robust tipping and queuing workflows (manual and automated) in the TIP, routing, enriching, triaging, and disseminating inbound/outbound intelligence.Maintain TIP data integrity via accurate tagging, metadata management, traceability, and feed normalization, adhering to standards such as STIX, JSON, and MISP formatting.Implement tagging governance (multitag, rulebased, hierarchical), including TLP designations, source/analyst attribution, and threat context to support consistent access control and data lineage. Analytic Frameworks & Requirements AlignmentApply recognized analytic models and frameworksMITRE ATT&CK, Diamond Model, Cyber Kill Chainto structure intelligence, map adversary behavior, and align reporting to Priority Intelligence Requirements (PIRs) and Threat Branch Information Needs (INs).Strengthen threat prioritization by correlating activity, vulnerabilities, and attack surfaces across sectors and threat groups to support campaign tracking, risk scoring, and intelligencedriven resource allocation.Identify and prioritize intelligence requirements for the Threat Branch, tagging reporting to INs nested under PIRs. Intelligence Production Cycle & Targeted NotificationsManage the full intelligence production cycletopic formation, proposal, development, coordination, review, approval, and disseminationensuring compliance with analytic standards.Review intelligence products for analytic rigor, technical accuracy, and conceptual soundness.Produce targeted notification packages that are timely, accurate, and actionable, integrating classified and unclassified reporting.Oversee the issuing, triage, and tracking of RFIs in the TIP, maintaining timely responses, status visibility, and stakeholder coordination.Capture customer feedback on threat intelligence products and integrate insights into continuous improvement to enhance relevance, clarity, and mission impact. Cyber Defense Support & CrossFunctional IntegrationStrengthen national cyber defense by overseeing continuous monitoring, triage, investigation, and reporting of cybersecurity events and incidents across FCEB, SLTT, and critical infrastructure environments.Document all analysis in required formatsticketing entries, knowledge articles, external reports, incident response playbooks.Accelerate threat discovery by directing development of custom scripts and AI/MLenabled analytic techniques.Create, deploy, and refine detection logic and policies used across monitoring tools and platforms; maintain enterpriselevel incident response and hunt analysis baselines for each supported environment. SOPs, Training, and Source Repository ManagementDevelop, document, and maintain repeatable SOPs and working instructions for targeted notifications and production workflows; train new personnel on current processes and tools.Maintain a curated repository of classified and unclassified sources, ensuring traceability and timely aggregation of threat reporting that enables targeted notification and production activities.Monitor global events and provide eventdriven intelligence within the TIP, assessing implications of new laws, geopolitical shifts, and natural incidents for CIKR.Support exercises and realtime incident response with TIPenabled intelligence, delivering rapid assessments, briefings, and coordination that increase detection, containment, and remediation effectiveness. Required QualificationsExperience leading CTI operations and data management for largescale federal or criticalinfrastructure cybersecurity programs.Demonstrated ability to oversee TIP operations, data governance, ingestion pipelines, tagging standards, and intelligence production workflows.Strong knowledge of analytic frameworks (ATT&CK, Diamond Model, Kill Chain), threat prioritization, and targeted notification practices.Experience managing RFIs, dashboards/visualizations, and eventdriven reporting for leadership decision support.Excellent communication skills and the ability to drive continuous improvement across CTI products and processes.Ten years of overall cybersecurity experience with 5 years of management of cybersecurity teams Preferred QualificationsExperience supporting CISA, DHS, or nationallevel cyber missions.Familiarity with STIX/JSON/MISP data formats, TLP tagging governance, and NCISS scoring methods.Relevant certifications (e.g., GCTI, CISSP, GCIA, GREM, CDMP) and experience with AI/MLenabled detection analytics.Background integrating CTI with incident response, hunt operations, and vulnerability management programs. GDIT IS YOUR PLACE401K: With company match.Health & Wellness: Comprehensive health and wellness packages.Career Growth: Internal mobility team dedicated to helping you own your career.Professional Development: Growth opportunities including paid education and certifications.Innovative Tech: Access to cutting-edge technology to stay ahead of the mission.Work-Life Balance: Rest and recharge with paid vacation and holidays
|
| Company Name: |
General Dynamics IT |
| Website: | https://www.gdit.com/careers/job/939f0599c/cyber-threat-intelligence-data-manager-top-secret/?source=AutoAppend_HBCU |
Apply Now |
Forward Job to a Friend |
More Jobs From This Employer
|
|
|