Counterintelligence Cyber Officer Level 4 - Threat Analyst

Location: Springfield, VA
Date Posted: 12-04-2017
Overall Assignment Description:  To produce, per analyst on average, 36 weekly threat reports, 8 monthly threat reports, three quarterly threat reports, and one annual threat study for each specific focus or area.  In addition, each analyst will average 6 reports of inquiry (ROI) and or requests for information (RFI) and publish or contribute to nine Intelligence Information Reports (IIR) annually. Finally, each analyst will produce, on average, 48 weekly status reports. Reports will conform to the information below.

Duties may include:
  • Produce weekly actionable cyber CI cyber threat reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary.  Threats reports will include:
    • Threat data collected and reported by NGA Cyber CI team and network security personnel.
    • Intelligence reported by the Intelligence Community.
    • Fusion of all source threat analysis derived from multiple intelligence sources (INTS).
    • Imagery when available.
    • Information that can be used to inform cyber security decisions.
  • Produce monthly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:
    • Compilation of data collected and reported in weekly products.
    • Intelligence reported by the Intelligence Community.
    • Fused All Source threat analysis derived from multiple INT’s.
    • Imagery when available.
    •  Depiction of cyber threat (s) to NGA to inform cyber security decision makers.
  • Produce quarterly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Threat reports should include:
    •  Compilation of data collected and reported in weekly and monthly products.
    •  Intelligence reported by the Intelligence Community.
    •  Fused all source threat analysis derived from multiple INT’s.
    •  Include imagery when available.
    •  Depiction of cyber threat (s) to NGA to inform cyber security decisions.
  • Produce annual cyber CI threat studies in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Annual threat studies are based on the fiscal year timeline. Threat studies should include:
    •  Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products.
    •  Raw and finished Intelligence reported by the Intelligence Community.
    •  Fused all source threat analysis derived from multiple INT’s.
    •  Include imagery when available.
    •  Analytic judgments, intelligence gaps, and overall cyber threat (s) to NGA.
  • Produce CI Information Reports on an as needed/required basis. Produce IIRs from data collected and reported by either the cyber CI team or the NGA cyber security personnel. Effective IIR writing requires:
    • Coordination with teammates and NGA cyber security to ensure accuracy of reported information.
    • Cross referencing local information reporting with Intelligence Community reporting.
    • Clear and concise writing to briefly convey threat.
    • Responsiveness to Intelligence Community priority collections requirements.
    • Timeliness.
  • Perform inquiries of anomalous activity using cyber or related automated investigative tools (using most, if not all of the following: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE and Proton).
  • Provide cyber CI advice and expertise in support of CI inquiries, operations and issues.
  • Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.
  • Conduct research, evaluate collection, and perform analysis on cyber intelligence topics of interest to SIC leadership, analysts and customers.
  • Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner. 
  • Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.
  • Demonstrate current subject matter expertise on cyber issues, threats and trends.
  • Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.
  • Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.
  • Display an ability to collaborate with internal NGA and external IC/Cyber community members.
 
Skills and Experience:

Required:
  • Level IV: Shall possess a minimum of 11 years CI experience, of which at least 5 of those years include CI cyber analytic or CI cyber investigations experience. 
  • Shall be a credentialed graduate of an accredited federal or DoD CI training academy (ex. FBI Academy, etc.).
  • Shall possess a Bachelor’s Degree in Computer Science, Engineering, or a related technical discipline.
     
Desired:
Possess post-graduate degree in Computer Science, Engineering, or a related technical discipline.


SECURITY CLEARANCE IS REQUIRED
 
AC4S is an Equal Opportunity Employer, including disabled and vets
this job portal is powered by CATS
Powered by CATS.