Provide time sensitive cyber strategic technical analyses, assessments, collaboration, situation awareness, and recommendations to National Cyber Centers, Law Enforcement (LE), Intelligence Community (IC) and Partners. Provide support addressing adversary’s indicators, tactics, techniques, and procedures (TTPs). Monitor information feeds and data sources to identify potential cyber threats, including identifying and reporting activity levels, target of interest, and timeframes for attack. Identify, analyze, research, and correlate events, malicious activity, and new sources to provide early warning related to a variety of cyber threats.
A minimum of 4 years cyber experience
A minimum of a TS/SCI w/ CI Poly clearance. The CI Poly portion of the clearance must have been active sometime within the last 5 years.
B.S./B.A. in Computer Science or other related IT field. 4 years of related work experience will be considered in lieu of degree .
DoD IA and 8570 Certification (Security+, Network+, SSCP, CISSP, or CEH)
Experience with computer programming languages, including Python, SQL, C++, Perl, Java or other associated languages
Experience with cyber, computer network operations, network protocols, information operations or information warfare, or topical cyber expertise
Knowledge of various cyber threats
Experience with network protocol analyzer tools (Wireshark, NetworkMiner, or Snort)
Experience in researching data from multiple sources and databases, and analyzing findings
Knowledge of general global political and security issues, regional expertise and overseas
Experience in gathering data, analyzing findings, documenting results and conducting threat cyber analysis
Experience in targeting or analysis within the Intelligence Community
Experience with Microsoft Office, Visio, and i2 Analyst’s Notebook