Return to Job Search
 
BA105 Cyber Intelligence Analyst Russian Sr Nov 5, 2018
Baltimore, MD  
  Requirements
Cyber Intelligence Analyst
Clearance: TS/SCI considered CI Poly Desired
Location: Linthicum, MD


Required Skills: Required Skills:
? BA/BS degree in Information Technology or Information
Security, Computer Science, Intelligence Studies, Cyber
Security or another related field of study or equivalent
3+ years performing technical cyber threat intelligence
analysis.
? Strong technical skills proficiency in the following
areas: network communication using TCP/IP protocols, basic
system administration, basic understanding of malware
(malware communication, installation, malware types),
intermediate knowledge of computer network defense
operations (proxy, firewall, IDS/IPS, router/switch) and
open source information collection. Candidate must have a
thorough understanding of Domain Name Service records.
? Strong knowledge of Cyber Threat Intelligence principles
to include indicators of compromise (IOC) types, indicator
pivoting and indicator attribution strength.
? Strong understanding of US Intelligence Community and
how cyber intelligence organizations work together for
purposes of conducting cyber threat analysis
? Strong proficiency hunting APT data using open source
cyber threat analytic tools or data repositories such as
VirusTotal, Passive Total, Threat Miner, or Maltego
? Strong proficiency and recent experience (within last 3
years) performing NETFLOW and PCAP analysis using common
analysis tools (examples include Wireshark, Splunk,
ChopShop, Dshell, Network Miner, Moloch, etc). Candidate
must be strongly proficient at sessionizing PCAP data,
identifying and decoding protocols, extracting files, and
applying standard filters such as Berkley Packet Filter
(BPF).
? Strong proficiency Report writing - a technical writing
sample and technical editing test will be required if the
candidate has no prior published intelligence analysis
reporting
? Strong or Intermediate ability to apply formal
intelligence analysis methods, develop hypothesis,
prove/disprove relationships, always ask why, defend your
analysis, and apply attribution to cyber threat activity.
Candidate must be able to make confidence-based
assessments for purposes of attribution based on their
technical analysis of network traffic, multi-source data,
malware and system forensic analysis. Candidate must be
able to identify analytic bias.
? Intermediate ability to build intrusion related data
visualizations and perform analysis (i.e., using I2
Analyst Notebook, Netviz, Palantir, etc)
? Intermediate ability to present technical information
and analysis to groups up to 50 persons on a quarterly
basis. Candidate will be required to brief smaller groups
up to 10 persons on a weekly basis.
? Self-starter with the ability to proactively engage and
develop relationships with intrusion set subject matter
experts and analyst counterparts across the US
Intelligence and Law Enforcement communities
? Cyber intelligence analysis experience focusing on
Eurasia or the "near abroad" preferred.

Desired Skills:
? Russian language, ILR 3/3 level of general proficiency
(or equivalent certified language training standard) with
a test date in the last 3 years
? Familiarity with / experience researching Secure Sockets
Layer (SSL) certificates and IP Geolocation
? Experience applying Kill Chain analysis, Cyber
Intelligence Preparation of the Environment (CIPE)
modeling, or Diamond modeling of cyber threat activity
? Certifications (any): CISSP, CEH, Network+, CCNA,
Security+, SANS certification(s) such as GPEN or GCIH
? Advanced NETFLOW and PCAP Analysis
? Advanced Data Visualization proficiency leveraging
COTS/GOTS tools
? Technical Skills proficiency: Python language,
encryption technologies/standards
? Intermediate malware analysis or digital computer
forensics experience
? Any type of Cyber related Law Enforcement or
Counterintelligence experience
? Existing Subject Matter Expert of Advanced Persistent
Threat activity
? Experience using COTS/Open Source tools: Novetta Cyber
Analytics, Mitre ChopShop and/or ARL DSHELL
? Analyst experience in Federal Cyber Center, NSA, or
Corporate CIRT
? Formal training as an intelligence analyst in any
discipline
? graduate of US Govt intelligence analysis course: CAC,
IBC, Kent School, IC 101, Analysis 101, Army, Navy, Air
Force, etc

Description:
The selected candidate will serve as a cyber intelligence
analyst within the Defense Cyber Crime Center (DC3)
Analytical Group. The analyst provides the customer with
expertise in Intelligence sources, collection methods and
analytic techniques. The analyst collaborates among
interagency partners to identify malicious activity and
provide analytic support to LE/CI investigations and
operations. The analyst performs analysis on existing and
emerging advanced persistent threat (APT) organizations,
actors, and malware.

Ideal candidate is an experienced cyber intelligence
analyst or law enforcement/counterintelligence (LE/CI)
analyst or agent, who has applied their mastery of cyber
threat intelligence, intelligence analysis techniques, and
sources and methods to produce high quality analysis
products for the last 5 years.

Only candidates with a current TS/SCI clearance will be
considered.

Candidates with CI Poly preferred, but not necessary to
start.

Alliant LCAT Description: Possesses and applies a
comprehensive knowledge across key tasks and high impact
assignments. Plans and leads major technology assignments.
Evaluates performance results and recommends major changes
affecting short-term project growth and success. Functions
as a technical expert across multiple project assignments.
May supervise others.

Suggested Qualifications: 18-22 years of professional
experience without a degree; or 10-14 years of
professional experience with a Bachelors degree from an
accredited college in a related discipline, or equivalent
experience/combined education; or 8-12 years of
professional experience with a related Masters degree; or
4 years of professional experience required with a related
PhD or JD; Considered an emerging authority / authority in
discipline. Consideration should always be given for the
level of specific domain expertise.
  Apply
If you have previously submitted your resume input your login and password and click apply.
Login:
Password:
Click here if you are applying for the first time.