CI Cyber Threat Technical Analyst
2 weeks ago
CI Cyber Threat Technical Analyst Seize your opportunity to make a personal impact as a CI Cyber Threat Technical Analyst supporting our intelligence customer. GDIT is your place to make meaningful contributions to challenging projects and grow a rewarding career. At GDIT, people are our differentiators. As a CI Cyber Threat Technical Analyst, you will help ensure that today is safe and tomorrow is smarter. Our work depends on a TS/SCI level cleared CI Cyber Threat Technical Analyst joining our team to support our customer. Duties & Responsibilities: Produce weekly actionable Technical CI (Cyber/TSCM/TEMPEST) threat reports in collaboration with teammates, partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly threat reports, each report due NLT 0800 each Monday morning. Threats reports will include: Threat data collected and reported by the customers Technical CI team and network security personnel. Intelligence reported by the Intelligence Community. Fusion of all source threat analysis derived from multiple intelligence sources (INTS). Imagery when available. Information that can be used to inform security decisions. Monthly Technical CI threat reports in collaboration with teammates, the customers partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include: Compilation of data collected and reported in weekly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Imagery when available. Depiction of Technical CI threat (s) to inform security decision makers. Quarterly Technical CI threat reports in collaboration with teammates, the customers partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include: Compilation of data collected and reported in weekly and monthly products. Intelligence reported by the Intelligence Community. Fused all source threat analysis derived from multiple INTs. Include imagery when available. Depiction of Technical CI threat (s) to the customer to inform security decisions. Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, customer partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 December. Threat studies should include: Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products. Raw and finished Intelligence reported by the Intelligence Community. Fused all source threat analysis derived from multiple INTs. Include imagery when available. Analytic judgments, intelligence gaps, and overall technical threat(s) to the customer. Produce CI Information Reports and IIRs from data collected and reported by either the Technical CI team or the cyber security personnel. Provide a minimum of 6 Reports of Inquiry and/or Requests for Information within Fiscal year. Effective IIR writing requires: Coordination with teammates and stakeholders to ensure accuracy of reported information. Cross referencing local information reporting with Intelligence Community reporting. Clear and concise writing to briefly convey threat. Responsiveness to Intelligence Community priority collections requirements. Timeliness. Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE or Criss Cross). Provide Technical CI advice and expertise in support of CI inquiries, operations and issues. Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners. Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers. Possess and demonstrate an analytical skill set to draw high-quality, appropriate and objective conclusions from information in a timely manner. Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages. Possess and demonstrate current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats.) Possess and demonstrate the skillset to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards. Possess and demonstrate proficiency in use of bottom-line-up-front (BLUF) writing. Possess and demonstrate the skills needed to collaborate internally and externally with IC/Cyber community members. Coordinate CI Cyber activities originating from Enterprise Incident Response Events. Conduct liaison between CI Office, Insider Threat, Cyber Security Operations Center (CSOC), other Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission. Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures. Skills and Experience: Required: 7+ years of Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations. Meet minimum training requirements, within one calendar year of assignment, for access to DoD networks in accordance with DoDM 8140.03, by attaining and maintaining at least baseline certification for DoDM 8140.03 Information Assurance Technician Level II compliance. Desired: Be a credentialed graduate of an accredited federal or DoD CI training academy. Possess a Bachelor's degree in Science, Technology, Engineering or Mathematics disciplines. Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines. Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to US Gov. Location: Customer Site Clearance: Active TS/SCI with ability to obtain CI Poly US Citizenship Required The likely salary range for this position is $117,300 - $158,700. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Scheduled Weekly Hours: 40 Travel Required: None Telecommuting Options: Onsite Work Location: USA VA Springfield Additional Work Locations: N/A Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.
-
CI Cyber Threat Technical Analyst
3 weeks ago
Springfield, United States General Dynamics Full timeCI Cyber Threat Technical Analyst Seize your opportunity to make a personal impact as a CI Cyber Threat Technical Analyst supporting our intelligence customer. GDIT is your place to make meaningful contributions to challenging projects and grow a rewarding career. At GDIT, people are our differentiators. As a CI Cyber Threat Technical Analyst, you will help...
-
CI Cyber Threat Technical Analyst
1 week ago
Springfield, VA, United States General Dynamics Information Technology Full timeType of Requisition: Pipeline Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret SCI + Polygraph Public Trust/Other Required: None Job Family: Cyber and IT Risk Management Job Qualifications: Skills: Data Compilation, Intelligence Reports, Threat Assessment Certifications: None Experience: 7 + years of...
-
CI Cyber Threat Technical Analyst
4 days ago
Springfield, United States General Dynamics Full timeResponsibilities for this Position Location: USA VA Springfield Full Part/Time: Full time Job Req: RQ206538 Type of Requisition: Pipeline Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret SCI + Polygraph Public Trust/Other Required: None Job Family: Cyber and IT Risk Management Job Qualifications:...
-
CI Cyber Threat Analyst with Security Clearance
2 weeks ago
Springfield, United States Sphinx Full timeAbout SphinxSphinx is a full spectrum security and intelligence company established by a group of like-minded Veterans. We are passionate about supporting our client’s missions and ensuring they are prepared to address the modern threat environment. Sphinx provides services to an array of clients within the US Intelligence Community, Department of Defense,...
-
CI Cyber Threat Technical Analysis
1 day ago
Springfield, VA, United States IC-CAP, LLC Full timeCI Cyber Threat Technical Analysis (Level 3) will ensure all required reports are complete with minimal errors and that all processes, activities, and reports are conducted with in established time frames. He or she will also ensure analysts are trained in and follow the current standard operating procedures. Duties may include: Support team members in...
-
CI Cyber Threat Analyst
7 days ago
Springfield, United States IC-CAP Full timeCI Cyber Threat Analyst SME is tasked to provide expert input for the Counter Intelligence (CI) Cyber Branch to produce weekly, monthly, quarterly threat reports, and one annual threat study for each specific focus or area. The SME will provide relevant information for the CI Cyber Branch to produce annual intelligence information reports (IIR). The SME will...
-
CI Cyber Threat Technical Analysis
1 week ago
Springfield, United States IC-CAP Full timeCI Cyber Threat Technical Analysis (Level 3) will ensure all required reports are complete with minimal errors and that all processes, activities, and reports are conducted with in established time frames. He or she will also ensure analysts are trained in and follow the current standard operating procedures. Duties may include: * Support team members in...
-
Counterintelligence Cyber Threat Analyst
3 days ago
Springfield, VA, United States ManTech Full timeMANTECH seeks a motivated, career and customer-oriented Counter Intelligence Cyber Threat Analyst to join our team in Springfield, VA. Responsibilities include but are not limited to: Generate timely and actionable intelligence reports on technical counterintelligence (CI) and cyber threats to NGA. This includes producing 36 weekly status reports, 8...
-
Counterintelligence Cyber Threat Analyst
3 days ago
Springfield, VA, United States ManTech Full timeMANTECH seeks a motivated, career and customer-oriented Counter Intelligence Cyber Threat Analyst to join our team in Springfield, VA. Responsibilities include but are not limited to: Generate timely and actionable intelligence reports on technical counterintelligence (CI) and cyber threats to NGA. This includes producing 36 weekly status reports, 8...
-
Counterintelligence Cyber Threat Analyst
7 days ago
Springfield, VA, United States ManTech Full timeMANTECH seeks a motivated, career and customer-oriented Counter Intelligence Cyber Threat Analyst to join our team in Springfield, VA. Responsibilities include but are not limited to: Generate timely and actionable intelligence reports on technical counterintelligence (CI) and cyber threats to NGA. This includes producing 36 weekly status reports, 8...