We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

DCISE Technical Lead

ANALYGENCE
United States, Maryland, Linthicum Heights
Apr 24, 2026
Tharros is seeking a DCISE Technical Lead to serve as the project lead for all Defense Industrial Base Collaborative Information Sharing Environment (DCISE) operations at the DoD Cyber Crime Center (DC3). This position provides technical oversight and guidance across five DCISE task areas and serves as the contractor representative to DCISE executive leadership.
The Technical Lead will direct a team of cyber threat analysts and intelligence professionals who produce approximately 1,600 analytical products per year, conduct malware triage and analysis, manage partner engagement, and operate sensor platforms.
Responsibilities:
  • Provide technical oversight and guidance on all DCISE tasks, including threat analysis, partner engagement, and analytical product development
  • Serve as the contractor representative to DCISE executive leadership
  • Supervise a team of cyber threat analysts, cyber intelligence analysts, and partner engagement specialists producing all-source cyber analytical products
  • Direct malware triage, suspicious file scanning, indicator pivoting, and network analysis operations
  • Oversee intelligence analysis processes including OSINT and closed-source intelligence gathering, source verification, data fusion, link analysis, and threat actor profiling
  • Manage the quality, timeliness, and accuracy of all DCISE deliverables
  • Support financial and business process management for DCISE tasks, excluding inherently governmental functions
  • Coordinate with DIB partners on cyber threat information sharing, incident response, and vulnerability mitigation
  • Contribute to the development and maintenance of DCISE SOPs and analytical tradecraft standards
  • Active Top Secret/SCI clearance eligibility
  • 10 years of experience leading technical efforts supporting intelligence analysis requirements in all-source cyber analysis and reporting
  • 10 years of experience supervising teams supporting intelligence analysis requirements in all-source cyber analysis and reporting
  • 10 years of experience with scanning tools (e.g.,VirusTotal)to conductsuspicious file scanning, and performing queries, pivoting on indicators, and malware analysis on characteristics (MD5, SHA1, file size, file name, file paths)
  • 10 years of experience with intelligence analysis processes, including OSINT and closed-source intelligence gathering, source verification, data fusion, link analysis, and threat actor knowledge
  • 10 years of experience conducting malware and network analysis,identifyingprotocols, persistence mechanisms, encoding techniques, and encryption and how they are used by Advanced Persistent Threat (APT) actors


Preferred Qualifications


  • Prior DCISE, CISA, or DC3 operational experience
  • Experience with DIB cybersecurity programs and 32 CFR Part 236 mandatory/voluntary reporting requirements
  • Familiarity with threat intelligence platforms (CrowdStrike, Intel 471, Recorded Future, or equivalent)
  • GIAC certifications (GCTI, GREM, GCIH) or equivalent technical credentials
  • Experience producing finished intelligence products under IC analytic standards
Applied = 0

(web-bd9584865-5svq2)