Return to Job Search
 
BA 127 Computer Forensic and Intrusion Analyst (Se Jul 23, 2018
Baltimore, MD  
  Requirements
Computer Forensic and Intrusion Analyst (Senior)
Clearance: TS/SCI CI Poly Desired
Location: Linthicum, MD


• BA/BS degree in Information Technology or Information
Security, Computer Science, Intelligence Studies, Cyber
Security or another related field of study or equivalent 3+
years performing technical cyber threat intelligence
analysis.
• Strong knowledge of general intelligence analysis
principles governing the collection and evaluation of raw
intelligence as well as the production and publication of
finished intelligence
• Strong knowledge of business intelligence and analytics,
including supply chain risks
• Strong knowledge of Cyber Threat Intelligence (CTI)
principles to include indicators of compromise (IOC) types,
indicator pivoting and indicator attribution strength.
• Strong understanding of US Intelligence Community and how
cyber intelligence organizations work together for purposes
of conducting cyber threat analysis
• Strong proficiency in report writing
• Strong or Intermediate ability to apply formal
intelligence analysis methods, develop hypothesis,
prove/disprove relationships, always ask why, defend your
analysis, and apply attribution to cyber threat activity.
Candidate must be able to make confidence-based assessments
for purposes of attribution based on their technical
analysis of network traffic, multi-source data, malware and
system forensic analysis. Candidate must be able to
identify analytic bias.
• Intermediate ability to present technical information and
analysis to groups (Candidate may be required to brief up
to 50 persons on a quarterly basis and smaller groups of up
to 10 persons on a weekly basis)
• Strong ability to conduct Incident Report Analysis on
incidents reported under applicable DFARS procedures
• Strong familiarity with the damage assessment process,
specifically regarding data compromised as a result of
adversary intrusions into contractor networks.
• Strong ability to provide analysis supporting assessments
of the overall impact of data loss on current and future
USAF weapons programs, scientific and research projects,
and warfighting capabilities (in accordance with guidance
as set forth in AFI 33-200)
• Self-starter with the ability to proactively engage and
develop relationships with intrusion set subject matter
experts and analyst counterparts across the US Intelligence
and Law Enforcement communities
• Familiarity with DoD Damage Assessment Management Office
(DAMO) Program guiding documents and mission (DFARS
Procedures, Guidance, and Information (PGI) 204.7303-4 DoD
damage assessment activities)

Desired Skills:

• Formal training as an intelligence analyst in any
discipline – graduate of US Govt intelligence analysis
course: CAC, IBC, Kent School, IC 101, Analysis 101, Army,
Navy, Air Force, etc
• Certifications (any): CISSP, CEH, Security+, SANS
certification(s), Network+, CCNA
• Advanced Data Visualization proficiency leveraging
COTS/GOTS tools
• Any type of Cyber related Law Enforcement or
Counterintelligence experience
• Existing Subject Matter Expert of Advanced Persistent
Threat activity
• Analyst experience in a Federal Cyber Center or corporate
computer incident response team
he selected candidate will serve Program Analyst/Cyber
Threat Analyst at the Defense Cyber Crime Center -
Analytical Group (DC3-AG) in Linthicum, MD. The candidate
will use their experience, knowledge, and analytical skills
to support the Joint Acquisition Protection and
Exploitation Cell (JAPEC) effort. The candidate will
perform analytical research in a team environment focused
on cyber threat actors/activity, author and review
intelligence products by applying technical expertise,
while also consulting and making recommendations for new
solutions to cyber analytical issues as needed.
Additionally, the candidate will be expected to collaborate
with analysts from DC3-AG, analysts and JAPEC stakeholders
outside of DC3, various other Intelligence Community
agencies, and other Defense Criminal Investigative
Organizations (AFOSI, CID, NCIS) on a regular basis. The
candidate will rely heavily on their experience serving in
past intelligence analyst roles in DoD, Computer Network
Operations, Law Enforcement/Counterintelligence, or
Intelligence Community mission focused organizations. The
selected candidate should be comfortable writing documents
up to 30 pages in length.
Only candidates with a current TS/SCI clearance will be
considered.
Candidates with CI Poly preferred, but not necessary to
start.
Alliant LCAT Description: Possesses and applies a
comprehensive knowledge across key tasks and high impact
assignments. Plans and leads major technology assignments.
Evaluates performance results and recommends major changes
affecting short-term project growth and success. Functions
as a technical expert across multiple project assignments.
May supervise others.
Suggested Qualifications: 18-22 years of professional
experience without a degree; or 10-14 years of professional
experience with a Bachelors degree from an accredited
college in a related discipline, or equivalent
experience/combined education; or 8-12 years of
professional experience with a related Masters degree; or 4
years of professional experience required with a related
PhD or JD; Considered an emerging authority / authority in
discipline. Consideration should always be given for the
level of specific domain expertise.
  Apply
If you have previously submitted your resume input your login and password and click apply.
Login:
Password:
Click here if you are applying for the first time.