Cyber Intelligence Analyst

Company Name:
Cyber Intelligence Analyst
Requisition ID : 14011430
Business Sector : Information Systems
Location : United States-Virginia-Fort Belvoir
US Citizenship Required for this Position : Yes
Relocation Assistance : No relocation assistance available
Clearance Type : SCI
Number of Openings : 1
Shift : 1st Shift
Are you ready for the next step in your career?
Northrop Grumman Information Systems is seeking a highly motivated Cyber Intelligence Analyst to join our team of qualified, diverse individuals, providing in-depth analysis of current and future cyber threat activity to the U.S. Army Cyber Command at Fort Belvoir, Virginia. This is an excellent opportunity for a rising star to contribute to a unique cyber intelligence mission, protecting the Army''s networks and sensitive data against a variety of highly skilled adversaries.
The selected individual will be responsible for the following day-to-day activities:
Conducting research and evaluating technical and all-source intelligence--with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures--focusing on the threat to networked weapons platforms and US and DoD information networks.
Correlating threat data from various sources to establish the identity and modus operandi of hackers active in Army networks or posing potential threats to Army networks.
Analyzing network events to determine the impact on current operations and adversary capability or intent.
Preparing assessments and cyber threat profiles of current events based on the sophisticated collection, research and analysis of classified and open source information.
Drafting and reviewing technical documents and diagrams, with a strong emphasis on accuracy, brevity, and clarity.
Producing high-quality papers, presentations, recommendations, and findings for senior US government intelligence and network operations officials.
Providing briefings and presentations to customer leadership supporting Information Assurance (IA) and Computer Network Operations decision making.
Additionally, a results-oriented individual will fully realize success in this role by excelling in the following:
Keeping up-to-date with current world events and IT/cyber-related news--and synthesizing possible implications to mission success.
Demonstrating a strong initiative and desire to enhance technical and analytical acumen.
Exhibiting a spirit of commitment and pursuit of excellence towards mission accomplishment and team growth.
Effectively multi-tasking and setting priorities among competing deadlines.
Working either independently or in a group dynamic, with minimal supervision.
Basic Qualifications:
To be considered for this position, you must meet the following minimum requirements:
Active TS/SCI clearance.
Bachelor''s Degree in a related discipline and 2 years of mission-related experience or 6 years experience in lieu of degree.
DoD 8570-compliant within six months of start date.
Willingness to work Days or Swings shifts, as needed, to ensure mission success.
Demonstrated knowledge of Defense in Depth principles.
Demonstrated outstanding written, presentation, and interpersonal communication skills.
Candidates with a proven record in these desired capabilities will be given preferential consideration:
Active TS/SCI with CI polygraph.
Working knowledge of DoD national and tactical intelligence infrastructures, collection management and intelligence requirements procedures.
Technical expertise and experience in Digital Network Analysis and the functions and capabilities of common components in IT architectures.
OSI model, TCP/IP, LAN/WAN networking, Internet technologies, and related protocols.
Windows, UNIX, and Linux operating systems and security configurations.
CISSP, Security+, GCIH, CEH, or other IT/IA-related certifications that enhance mission effectiveness.
Delivering technical presentations to both technical and non-technical senior DoD and civilian leaders.
Working in a military environment and coordinating with federal-level interagency partners.
Engaging in security-focused working groups, committees, or organizations.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.