Return to Job Search
 
T2P 425 Computer Forensic & Intrusion Analyst (Jo May 6, 2021
Linthicum Heights, MD  
  Requirements
TS/SCI Only candidates with a current TS/SCI clearance will
be considered. Candidates with CI Poly preferred, but not
necessary to start.
Basic Qualifications:
• BA/BS degree in Information Technology or Information
Security, Computer Science, Intelligence Studies, Cyber
Security or another related field of study or equivalent 3+
years performing technical cyber threat intelligence
analysis.
• Strong technical skills proficiency in the following areas:
network communication using TCP/IP protocols, basic system
administration, basic understanding of malware (malware
communication, installation, malware types), intermediate
knowledge of computer network defense operations (proxy,
firewall, IDS/IPS, router/switch), domain name service, and
open source information collection. Pertinent skills or
experience include persona development, HUMINT targeting,
support to law enforcement or counterintelligence
investigations, Open Source Intelligence (OSINT) collection,
Social Media/Social Networking analysis.
• Strong understanding of US Intelligence Community Reporting
to include strength and proficiency in writing Intelligence
Analysis reports. Candidate must have at least 2 years of
experience writing intelligence analysis products within the
last 5 years. Ability to apply formal intelligence analysis
methods, develop hypotheses, prove/disprove relationships,
always ask why, defend your analysis, and apply attribution
to cyber threat activity. Candidate must be able to make
confidence-based assessments and be able to identify analytic
bias. Experience in raw intelligence and finished, according
to ODNI directives 203, 206, and 208. A technical writing
sample and technical editing test will be required.
• Strong proficiency using include indicators of compromise
(IOC) data in open source or commercial cyber threat analytic
tools or data repositories such as VirusTotal, Passive Total,
DomainTools.
Desired Skills:
• Persona Development: Experience building persona
development products within the LE/CI or Intelligence
Community, expertise in assessing sources using the PAMSSA
method.
•Training:
- Formal training as an intelligence analyst in any
discipline – graduate of USG intelligence analysis course:
CAC, IBC, Kent School, IC 101, Analysis 101, Army, Navy, Air
Force, etc
- Formal Law Enforcement/Counterintelligence experience or
training: i.e., FLETC, JCITA, etc.
- Analyst experience in Federal Cyber Center or Corporate
CIRT
Technical:
- Cyber Analytic Models: Experience applying Kill Chain
analysis, Cyber Intelligence Preparation of the Environment
(CIPE) modeling, or Diamond modeling of cyber threat activity
- Certifications: CISSP, CEH, Security+, SANS
certification(s), Network+, CCNA
- Advanced NETFLOW and PCAP Analysis, encryption
technologies/standards, malware analysis or digital computer
forensics experience
- Experience using GOTS, COTS/Open Source tools: i.e.,
NOEISIS, Novetta Cyber Analytics, Mitre ChopShop, ARL DSHELL,
Advanced Data Visualization proficiency leveraging COTS/GOTS
tools
The selected candidate will serve as a cyber intelligence
analyst within the Department of Defense Cyber Crime Center
(DC3) Analytical Group. The analyst provides the customer
with expertise in Intelligence sources, collection methods
and analytic techniques. The analyst collaborates among
interagency partners to identify malicious activity and
provide analytic support to LE/CI investigations and
operations. The analyst performs analysis on existing and
emerging advanced persistent threat (APT) organizations,
actors, and malware, ideally with a focus on threats
originating from the Middle East and Africa area of
responsibility (AOR). The analyst should have a strong
interest in and integrated understanding of the way varying
disciplines interact (CI, net defense, threat hunting,
digital forensics, and operational/strategic threat
intelligence). Ideal candidate is an experienced technical
cyber intelligence analyst or law enforcement /
counterintelligence (LE/CI) analyst or agent, who has applied
their mastery of cyber threat intelligence, intelligence
analysis techniques, and sources and methods to produce high
quality analysis products for the last 5 years.

Only candidates with a current TS/SCI clearance will be
considered. Candidates with CI Poly preferred, but not
necessary to start.
Alliant LCAT Description: Possesses and applies a
comprehensive knowledge across key tasks and high impact
assignments. Plans and leads major technology assignments.
Evaluates performance results and recommends major changes
affecting short-term project growth and success. Functions as
a technical expert across multiple project assignments. May
supervise others.
Suggested Qualifications: 18-22 years of professional
experience without a degree; or 10-14 years of professional
experience with a Bachelors degree from an accredited college
in a related discipline, or equivalent experience/combined
education; or 8-12 years of professional experience with a
related Masters degree; or 4 years of professional experience
required with a related PhD or JD; Considered an emerging
authority / authority in discipline. Consideration should
always be given for the level of specific domain expertise

  Apply
If you have previously submitted your resume input your login and password and click apply.
Login:
Password:
Click here if you are applying for the first time.