We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Cyber Intelligence Analyst III

Abacus Technology
United States, South Carolina, Sumter
Mar 25, 2026

Cyber Intelligence Analyst III
Job Locations

US-SC-Sumter


Job ID
2026-8594



Overview

Abacus Technology is seeking a Cyber Intelligence Analyst to support network operations for the AFCENT Network Operations and Security Center (NOSC) at Shaw AFB. This is a full-time position.



Responsibilities

    Analyze cyber intelligence reports to determine correlation and applicability to network operations on AFCENT networks.
  • Analyze network intrusion detection reports and vulnerability assessments to evaluate security posture as it pertains to current operations and information security levels.
  • Recommend security posture changes based on security analysis and changes in threat indicators.
  • Develop and provide reports and trend analyses of internal and external security activity, and incidents.
  • Provide on-shift training to contractor and government personnel to include analysis interpretation and threat/event correlation.
  • Track, document, and report all security related events, including, but not limited to, Discharge of Classified Information and Cross Domain Violations IAW USCENTCOM/AFCENT policy.
  • Coordinate and track Information Assurance Vulnerabilities Alerts (IAVA).
  • Review and report AFCENT compliance to USCENTCOM, and develop Plans, Objectives, Actions and Milestones (POA&M) if unable to complete task.
  • Provide LAN/WAN support.


Qualifications

5+ years experience in cyber and network operations. Bachelor's degree in a related field. Additional years of experience may be substituted for degree requirements. Must be Security+ certified. Must be Network+ and Linux+ certified. Must hold the ITIL v3 or v4 Foundations certification or be able to obtain the certification within 60 days of hire. Must have firewall and UNIX/Linux experience. Able to communicate complex programmatic cyber security planning information and elicit understanding and support from professional peers and non-specialists. Experience establishing policy to ensure intelligence threat inputs and intelligence supportability requirements are considered and integrated into market research and other research and development efforts. Experience performing analysis of security, auditing procedures and backup systems to thwart adversary penetration. Experience evaluating an adversary's network profile of physical location of assets, architectures, security policies, baseline activity, peculiarities and vulnerabilities, and capabilities. Able to assess information gaps and predict areas of information that enhance the collection cycle, based on collection strategies. Must be a US citizen and hold a current Top Secret clearance with SCI access (TS/SCI).

Applicants selected will be subject to a U.S. government security investigation and must meet eligibility requirements for access to classified information.

EOE/M/F/Vet/Disabled

Applied = 0

(web-bd9584865-7clgh)