user avatar

CI Cyber Threat Analyst support (Level IV) 127-005

IC-CAP

Today
Top Secret/SCI
Unspecified
Polygraph
IT - Security
Saint Louis, MO (On-Site/Office)

CI Cyber Threat Analyst support (Level IV) will ensure all required reports are complete with minimal errors and that all processes, activities, and reports are conducted with in established time frames. He or she will also ensure analysts are trained in and follow current standard operating procedures. They will contribute to the following annual production requirements:

Duties may include:
  • Produce weekly actionable Technical CI (Cyber) status reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly cyber status reports, each report due NLT 0800 each Monday morning. Status reports will include (as applicable):
  • Threat data collected and reported by NGA Technical CI team and network security personnel.
  • Intelligence reported by the Intelligence Community.
  • Fusion of all source threat analysis derived from multiple intelligence sources (INTs).
  • Imagery when available.
  • Information that can be used to inform security decisions.
  • Produce monthly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide a monthly threat report for the months not falling on the quarterly report month or the annual report month. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include:
  • Compilation of data collected and reported in weekly products.
  • Intelligence reported by the Intelligence Community.
  • Fused All Source threat analysis derived from multiple INTs.
  • Imagery when available.
  • Depiction of Technical CI threat (s) to NGA to inform security decision makers.
  • Produce quarterly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include:
  • Compilation of data collected and reported in weekly and monthly products.
  • Intelligence reported by the Intelligence Community.
  • Fused all source threat analysis derived from multiple INTs.
  • Include imagery when available.
  • Depiction of Technical CI threat (s) to NGA to inform security decisions.
  • Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 1 December. Threat studies should include:
  • Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products.
  • Raw and finished Intelligence reported by the Intelligence Community.
  • Fused all source threat analysis derived from multiple INTs.
  • Include imagery when available.
  • Analytic judgments, intelligence gaps, and overall technical threat(s) to NGA.
  • Produce IIRs from data collected and reported by either the Technical CI team, NGA cyber security personnel, or partner agencies. Provide a minimum of 9 IIRs within Fiscal year. Effective IIR writing requires:
  • Coordination with teammates and stakeholders to ensure accuracy of reported information.
  • Cross referencing local information reporting with Intelligence Community reporting.
  • Clear and concise writing to briefly convey threat.
  • Responsiveness to Intelligence Community priority collections requirements.
  • Timeliness.
  • Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE or Criss Cross).
  • Provide Technical CI advice and expertise in support of CI inquiries, operations and issues.
  • Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.
  • Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers.
  • Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner.
  • Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.
  • Demonstrate current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats.)
  • Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.
  • Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.
  • Display an ability to collaborate with internal NGA and external IC/Cyber community members.
  • Coordinate CI Cyber activities originating from Enterprise Incident Response Events.
  • Conduct liaison between CI Office, Insider Threat, Cyber Security Operations Center (CSOC), other NGA Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission.
  • Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures.


Skills and Experience:

Required:
  • Shall possess a minimum of 11 years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations.
  • Possess or obtain certification to comply with DoD 8570.01-M Information Assurance (IA) requirements within one calendar year of assignment at the sole expense of the vendor.
  • Shall possess or obtain and maintain IA II certification. See DoD 8570.01-M for acceptable certifications for each IA level.


Desired:
  • Be a credentialed graduate of an accredited federal or DoD CI training academy.
  • Possess a Bachelor's degree in Science, Technology, Engineering or Mathematics disciplines.
  • Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines.
  • Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to US Gov.
  • Experience translating Government vision into understandable and achievable measures.
  • Experience in using supervisory skills to coach teammates to achieve objectives
  • Monitor and track progress towards achievable measures.


Security Clearance:
  • Active TS/SCI and the willingness to sit for a polygraph, if needed


IC-CAP provides equal employment opportunities (EEO) to all applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status.
group id: 90908715
N
Name HiddenRecruiter
Find IC-CAP on Social Media
Network Employers
user avatar
About Us
About Us IC-CAP, LLC is dedicated to providing outstanding services to our partners and customers by bringing together talented personnel and providing them with additional skills and training. We are investing in improving analysis through integrating and building tools and training to help analysts discover what is under the surface. Founded in 2014 Certified Women-Owned Small Business (WOSB) HUBZone Certified Headquarters in Pomfret, MD IC-CAP’s Executive Staff has more than 75 years of combined experience in the Department of Defense, Intelligence Community, and Federal Markets. We understand what it takes to be successful and will work closely with our customers and partners in support of their missions. Our Executive Staff is readily available to handle any situation that may arise and will bring our experience and resources to complete the objective.

IC-CAP Jobs


Job Category
IT - Security
Clearance Level
Top Secret/SCI
Employer
IC-CAP