- Company Name
- Lafayette Group
- Job Title
- Cyber Incident Analyst
- Job Description
-
**Job title**
Cyber Incident Analyst
**Role Summary**
A senior cyber analyst who evaluates, monitors, and reports on active cyber incidents across IT, OT/ICS, cloud, and AI environments. The role blends deep technical expertise with consulting skills to advise government, industry, and critical infrastructure partners on threat assessments, mitigation strategies, and actionable intelligence. Requires coordination across diverse stakeholder groups and adherence to federal security standards.
**Expectations**
- Maintain a current understanding of emerging cyber threats, technologies, and regulatory frameworks.
- Communicate complex technical findings clearly to senior leaders, SOC teams, and CI stakeholders.
- Deliver recommendations that are actionable, realistic, and tailored to operational constraints.
- Work independently and collaboratively on multiple concurrent incident projects, meeting deadlines and quality metrics.
**Key Responsibilities**
1. Conduct real‑time analysis of cyber incidents, events, and vulnerabilities.
2. Produce written guidance and recommendations for incident mitigation and threat prevention.
3. Map technical insights to cyber frameworks (e.g., MITRE ATT&CK) and translate them into stakeholder‑specific formats.
4. Tailor vulnerability mitigation plans and contextual examples to facilitate rapid adoption by different jurisdictions and CI partners.
5. Define data sources and develop detection rules for malicious behavior across COTS and open‑source platforms.
6. Remain actively engaged with federal cyber security programs and partner organizations to provide proactive threat intelligence.
**Required Skills**
- 6+ years of professional experience in cyber analysis, threat intelligence, incident response, or equivalent.
- Expertise in incident monitoring, coordination, and operational reporting.
- Strong command of current threat landscapes, exploit vectors, and detection techniques.
- Proficiency in computer/network fundamentals: architecture, OS, vulnerabilities, encryption.
- Ability to write detection rules, manipulate data, automate tasks, and use scripting (Python preferred).
- Excellent analytical, critical‑thinking, oral, and written communication skills.
- Proven time‑management, organizational, and multi‑project execution abilities.
- Proficient with Microsoft Office Suite.
- U.S. citizen with an active TS security clearance and SCI eligibility; able to obtain DHS Suitability (EOD).
**Required Education & Certifications**
- Bachelor’s or Master’s degree in Cybersecurity, Information Technology, Political Science, or related field.
- Relevant professional certifications (CTIA, CEH, GREM, GCIH, GCFA) are highly desirable but not mandatory.
Washington dc-baltimore, United states
Hybrid
Mid level
14-01-2026