|
|
May 6, 2021 |
Linthicum Heights, MD |
|
|
|
|
TS/SCI Only candidates with a current TS/SCI clearance will be considered. Candidates with CI Poly preferred, but not necessary to start. Basic Qualifications: • BA/BS degree in Information Technology or Information Security, Computer Science, Intelligence Studies, Cyber Security or another related field of study or equivalent 3+ years performing technical cyber threat intelligence analysis. • Strong technical skills proficiency in the following areas: network communication using TCP/IP protocols, basic system administration, basic understanding of malware (malware communication, installation, malware types), intermediate knowledge of computer network defense operations (proxy, firewall, IDS/IPS, router/switch), domain name service, and open source information collection. Pertinent skills or experience include persona development, HUMINT targeting, support to law enforcement or counterintelligence investigations, Open Source Intelligence (OSINT) collection, Social Media/Social Networking analysis. • Strong understanding of US Intelligence Community Reporting to include strength and proficiency in writing Intelligence Analysis reports. Candidate must have at least 2 years of experience writing intelligence analysis products within the last 5 years. Ability to apply formal intelligence analysis methods, develop hypotheses, prove/disprove relationships, always ask why, defend your analysis, and apply attribution to cyber threat activity. Candidate must be able to make confidence-based assessments and be able to identify analytic bias. Experience in raw intelligence and finished, according to ODNI directives 203, 206, and 208. A technical writing sample and technical editing test will be required. • Strong proficiency using include indicators of compromise (IOC) data in open source or commercial cyber threat analytic tools or data repositories such as VirusTotal, Passive Total, DomainTools. Desired Skills: • Persona Development: Experience building persona development products within the LE/CI or Intelligence Community, expertise in assessing sources using the PAMSSA method. •Training: - Formal training as an intelligence analyst in any discipline – graduate of USG intelligence analysis course: CAC, IBC, Kent School, IC 101, Analysis 101, Army, Navy, Air Force, etc - Formal Law Enforcement/Counterintelligence experience or training: i.e., FLETC, JCITA, etc. - Analyst experience in Federal Cyber Center or Corporate CIRT Technical: - Cyber Analytic Models: Experience applying Kill Chain analysis, Cyber Intelligence Preparation of the Environment (CIPE) modeling, or Diamond modeling of cyber threat activity - Certifications: CISSP, CEH, Security+, SANS certification(s), Network+, CCNA - Advanced NETFLOW and PCAP Analysis, encryption technologies/standards, malware analysis or digital computer forensics experience - Experience using GOTS, COTS/Open Source tools: i.e., NOEISIS, Novetta Cyber Analytics, Mitre ChopShop, ARL DSHELL, Advanced Data Visualization proficiency leveraging COTS/GOTS tools The selected candidate will serve as a cyber intelligence analyst within the Department of Defense Cyber Crime Center (DC3) Analytical Group. The analyst provides the customer with expertise in Intelligence sources, collection methods and analytic techniques. The analyst collaborates among interagency partners to identify malicious activity and provide analytic support to LE/CI investigations and operations. The analyst performs analysis on existing and emerging advanced persistent threat (APT) organizations, actors, and malware, ideally with a focus on threats originating from the Middle East and Africa area of responsibility (AOR). The analyst should have a strong interest in and integrated understanding of the way varying disciplines interact (CI, net defense, threat hunting, digital forensics, and operational/strategic threat intelligence). Ideal candidate is an experienced technical cyber intelligence analyst or law enforcement / counterintelligence (LE/CI) analyst or agent, who has applied their mastery of cyber threat intelligence, intelligence analysis techniques, and sources and methods to produce high quality analysis products for the last 5 years. Only candidates with a current TS/SCI clearance will be considered. Candidates with CI Poly preferred, but not necessary to start. Alliant LCAT Description: Possesses and applies a comprehensive knowledge across key tasks and high impact assignments. Plans and leads major technology assignments. Evaluates performance results and recommends major changes affecting short-term project growth and success. Functions as a technical expert across multiple project assignments. May supervise others. Suggested Qualifications: 18-22 years of professional experience without a degree; or 10-14 years of professional experience with a Bachelors degree from an accredited college in a related discipline, or equivalent experience/combined education; or 8-12 years of professional experience with a related Masters degree; or 4 years of professional experience required with a related PhD or JD; Considered an emerging authority / authority in discipline. Consideration should always be given for the level of specific domain expertise
|
|
|
|
|
|