user avatar

Cyber Intelligence Analyst

Amentum

Today
Top Secret
Unspecified
Polygraph
IT - Security
Wahiawa, HI (On-Site/Office)

Job Summary:

The Cyber Intelligence Analyst will be a key member of our team, responsible for analyzing complex cyber threat data, producing actionable intelligence, and supporting cyber operations. This role requires a strong understanding of both intelligence analysis methodologies and network defense principles. The ideal candidate will possess experience in SIGINT analysis, a solid foundation in computer science or a related field, and a passion for staying ahead of the evolving cyber threat landscape. This position may require up to 10% travel.

Duties and Responsibilities:
  • Evaluate target opportunities using all-source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans.
  • Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and demonstrate a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.
  • Develop new tradecraft needed to perform this analysis as technologies evolve.
  • Work collaboratively with government, military, and other contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques: query, merge, enrich, evaluate, and pivot within data to attain and share insights.
  • Distill, document, contextualize and share findings--including any new tradecraft that is developed--with teammates, stakeholders, and intelligence consumers.
  • Conduct in-depth analysis of cyber threat intelligence, including emerging malware, vulnerabilities, and attack vectors.
  • Collect, evaluate, and fuse intelligence from diverse sources, including open-source intelligence (OSINT), signals intelligence (SIGINT), and Human intelligence (HUMINT). Identify correlations and patterns to enhance situational awareness and predictive analysis.
  • Assess the potential impact of cyber threats on network infrastructure and operations. Collaborate with cyber defense teams to develop and implement mitigation strategies and countermeasures.
  • Provide intelligence support during cyber incident response activities, including analysis of indicators of compromise (IOCs), attribution of cyber-attacks, and identification of adversary tactics, techniques, and procedures (TTPs).
  • Prepare and deliver clear and concise intelligence products, including reports, briefings, and presentations, for a diverse audience, including senior leadership, operational stakeholders, and technical teams.
  • Foster collaboration and information sharing with internal and external stakeholders, including other intelligence agencies, law enforcement, industry partners, and allied nations, to enhance cyber threat awareness and response capabilities.
  • Stay abreast of emerging cyber threats, technologies, and methodologies through continuous research and professional development.
  • Use information collected from a variety of sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur.
  • Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems.
  • Develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols (IOTs), and advanced network security.


Qualifications:
  • Active Top Secret Clearance w/SCI and current Polygraph.
  • US Citizenship is required to obtain a Top-Secret Clearance.
  • Demonstrative experience with SIGINT and Analytics and Modernization (AMOD)
  • Deep understanding of processing PCAP/packets efficiently and experience with cyber discovery and identification of indicators of compromise (IOCs).
  • Demonstrative experience with network protocol analyzer such as Wireshark, TCP Dump, etc.
  • Experience with sustained Intrusion Set - ability to link indicator and target-related information.
  • Familiarization with scripting such as python or object-oriented.
  • Experience with correlating Network Traffic collection from SIGINT resources.
  • Experience with tradecraft associated with Persona/Capability/Infrastructure development.
  • Excellent written and verbal communication skills to business, management, and technical teams.
  • Understanding of the Intelligence Cycle.
  • Knowledge of and connections with the Industry Base supporting diverse technical efforts within the IC.
  • Ability to apply advanced cybersecurity and communication technology principles, theories, and concepts contributing to the development of innovative Cyber Discovery principles and ideas.
  • Experience working on unusually complicated problems and providing solutions that are highly creative and resourceful.
  • Apply a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed.


Education and Experience:
  • Active Top-Secret Clearance with SCI eligibility and current CI/Full Polygraph (Must be within 4 years). Note: US Citizenship is required to obtain a Top-Secret Clearance.
  • A minimum of 4 years of experience working in direct support of cyber operations, conducting intelligence analysis, or performing network defense activities is preferred but not required.
  • Graduate of JCAC (Joint Cyber Analysis Course) or equivalent military cyber training program is preferred but not required.
  • Cyber Mission Force (CMF) Work Role Senior Certified (Host/Network Analyst, Exploitation Analyst, Interactive Operator) is preferred but not required
  • Bachelor's degree in computer science. Degrees in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an associate's degree.
  • STEM degree in Network Engineering, Systems Engineering, Information Technology, or related fields is preferred but not required. Extended military cyber training courses may be counted toward degree requirements.
  • Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) may be considered toward relevant experience requirements (24-week JCAC counts as 6 months of experience). 10+ years of experience in intelligence analysis with a focus on cyber threats and operations is preferred but not required. Relevant experience must be in computer or information systems design/development/analysis roles.


Preferred Qualifications:
  • Master's degree in computer science, Information Security, Cybersecurity, Intelligence Studies, Security Studies, or related field.
  • Experience in either DoD or IC organizations conducting cyber operations.
  • Additional industry technical certifications: NET+, SEC+, CEH, CISSP, OSCP, OSCE, CCSP; GCFA (or other GIAC certification)


The salary range for this position is $145K to $185K. (Salary to be determined by the education, experience, knowledge, skills, and abilities of the applicant internal equity, and alignment with market data.) This position includes a competitive benefits package. For more detailed information on our Benefits and what it is like to work for Amentum: please visit our careers site: www.amentumcareers.com

Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, sex, sexual orientation, pregnancy (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, ancestry, United States military or veteran status, color, religion, creed, marital or domestic partner status, medical condition, genetic information, national origin, citizenship status, low-income status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal laws and supplemental language at Labor Laws Posters .

Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, sex, sexual orientation, pregnancy (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, ancestry, United States military or veteran status, color, religion, creed, marital or domestic partner status, medical condition, genetic information, national origin, citizenship status, low-income status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal laws and supplemental language at Labor Laws Posters .
group id: 91156626
job ad image
Find Amentum on Social Media
Network Employers
user avatar
About Us
Amentum brings industry-best expertise, processes, and technology to ensure the availability and reliability of our Government and commercial clients’ vital facilities and equipment. We apply our culture of excellence to operate, maintain, and manage your global assets and complex supply chains to meet modern challenges at home and abroad
job ad2 image

Amentum Jobs


Job Category
IT - Security
Clearance Level
Top Secret
Employer
Amentum