Cyber Analysis Support Specialist (Senior)
at Pine Point Group
Maryland, Maryland, USA -
Start Date | Expiry Date | Salary | Posted On | Experience | Skills | Telecommute | Sponsor Visa |
---|---|---|---|---|---|---|---|
Immediate | 07 Feb, 2025 | Not Specified | 07 Nov, 2024 | 8 year(s) or above | Consideration,Training,Intelligence Analysis,Editing,Color,Writing,Reporting,Cadence,Databases,Fascia,Pathfinder | No | No |
Required Visa Status:
Citizen | GC |
US Citizen | Student Visa |
H1B | CPT |
OPT | H4 Spouse of H1B |
GC Green Card |
Employment Type:
Full Time | Part Time |
Permanent | Independent - 1099 |
Contract – W2 | C2H Independent |
C2H W2 | Contract – Corp 2 Corp |
Contract to Hire – Corp 2 Corp |
Description:
Location: MD
Experience: 8 years
Clearance Level: TS/SCI clearance with a CI polygraph (or Full Scope)
QUALIFICATIONS:
- Shall have a minimum of eight (8) continuous years of work experience in intelligence analysis or a related field, or a combination of a minimum of five (5) continuous years of work experience in intelligence analysis or a related field and a Bachelors degree in an applicable (math, science, computers, engineering) field. Work experience shall include five (5) years of IC or related experience in intelligence analysis.
- Shall have demonstrated expertise all forms of analysis reporting and experienced with creating each product type, and thus be able to organize training for other team members on analysis, tools, or reporting.
- Shall have demonstrated expertise with relevant CNO and SIGINT tools and databases used for the customer mission, and communications skills that include the ability to provide formal documentation of analysis and/or research results. Shall be considered a Subject Matter Expert in one or more fields appropriate to Intelligence Analysis or Computer Networking technologies, and be able to serve as a Subject Matter Expert for working groups and meetings with partner organizations I agencies.
- Shall have demonstrated expertise in analyzing intelligence information and technical data, analyzing exploitation opportunities, documenting information and processes, gathering intelligence information, interpreting analytical results. Performing Internet research, writing and editing skills at a technical/professional level, and managing internal and external customer relations. Shall be an effective writer and verbal communicator.
Required Tools: ANCHORY/MAUI, MARINA/YACHTSHOP, PATHFINDER, PINWALE/UIS, XKEYSCORE
Preferred Tools: BANYAN, CADENCE, CROSSBONES, FASCIA, MAINWAY, TUNINGFORK, TRICKLER, UTT
Equal Employment Opportunity Employer; all qualified applicants are encouraged to apply and will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, or veteran status.
Responsibilities:
- Performing tasks associated with the SIGINT and/or other intelligence disciplines’ production cycle, including researching, tasking, analysis, reporting, assessing, and interacting with customers.
- Analyzing and assessing technical and operational vulnerabilities in U.S./DOD or foreign current or emerging technologies or operations, and determining risk to U.S. networks of interest posed by adversarial systems, activities or operations.
- Analyzing all-source intelligence data, identifying critical threat information, researching historical threat reporting, and crafting assessments in support of customer information needs.
- Performing all-source research to identify and report on the intentions and capabilities of adversaries, state and non-state sponsored, to threaten, exploit or otherwise disrupt networks of interest to the U.S. and its allies.
- Assisting with the development of databases and other knowledge repositories on adversary information warfare and hacker capabilities, intentions and supporting infrastructures.
- Compiling and correlating data sets to determine levels of threats and vulnerabilities to U.S. network systems.
- Producing threat/vulnerability assessments.
- Performing risk and opportunity assessments through synthesis of information across intelligence disciplines and open-source information.
- Supporting NTOC efforts to partner with other organizations on the identification of vulnerabilities and corresponding threats with the goal of influencing mitigation strategies and solutions.
- Researching and analyzing data using available and appropriate analytic tools.
- Assisting technical personnel in developing automated analytic tools by providing specific information about adversary targets and techniques.
- Developing end-product report drafts and entering them into report production systems.
- Assisting in the evaluation and staffing of Information Needs (IN); interacting with customers, other production elements and data acquisition offices in order to meet customer needs.
- Scheduling meetings, analytic exchanges, organizing data and providing threat analysis support to branch and division-level managers.
- Participating in team building research efforts, sharing analytical techniques and research methodologies.
- Contributing to knowledge management by entering sources and analytic findings into appropriate databases and other repositories on a timely basis.
- Documenting reports and customer feedback in local Request for Information (RFI) tracking databases and other recording systems.
- Identifying adversary presence in the Internet and using visualization tools to map the information systems, networks and major servers they use.
- Using research and analytic findings to identify network associations and map them in diagram/topology presentations.
- Performing baseline and secondary analysis and providing visualization support by using Analyst Notebook and NetViz or other visualization tools.
- Making recommendations for additional collection possibilities when and where possible.
- Conducting and tracking behavior analysis and characterization of adversary decision processes, their technological dependencies and social network connections.
- Documenting all research and analysis using standard document and network mapping tools.
REQUIREMENT SUMMARY
Min:8.0Max:13.0 year(s)
Information Technology/IT
IT Software - Network Administration / Security
Other
Graduate
An applicable (math science computers engineering field
Proficient
1
Maryland, USA