Intelligence Analyst with Security Clearance

Maryland

Strategic Resilience Group
Apply for this Job
SRG is seeking an experienced Intelligence Analyst to join our team of Cyber Operation Analysts and Subject Matter Experts (SMEs) to support planning, coordination, synchronization, and execution of offensive cyberspace operations in support of aligned combatant command and designated sub-unified commands. This includes a deep understanding and experience in the employment of available cyberspace capabilities as well as the creation of future cyberspace capabilities. Tasking will include comprehensive cyber support for cyberspace operations planning and intelligence analysis at Joint Force Headquarters level.
Roles and Responsibilities:
The Intelligence Analyst will perform the following functions:

• Support the intelligence collection process and inter-office communications between the United States Intelligence Community, organic collections teams and multiple supported military headquarters Intelligence centers at the TS/SCI level.

• Contribute to the creation of intelligence collections strategy, develop intelligence indicators and submit collection requirements to theater and national intelligence activity and support the triage and dissemination of information to the appropriate consumer.

• Advise the Intelligence Officer and Operations Officer and other groups in the planning, coordinating and submission of intelligence requirements across a variety of interests. Required Qualifications: 1. TS/SCI with counterintelligence (CI) polygraph.
2. Individual should meet DODM 8570.01 IAT Level II position requirements.
3. Associate degree or higher in Computer Science, Cyber Security, Information Technology, Software
Engineering, Information Systems, or Computer Engineering from an accredited college or university and 2
years of experience in the field and CASP+, CCSP, Cloud+, or CLSSP certifications. OR - 4 years of experience as a Threat Analyst with experience in either Host analysis or Network analysis managing SIEM or SOAR platforms such as Elastic, Splunk, Sentinel or other open-source or government provided solutions. OR - 4 years of experience in Offensive Cyber Operations as an Exploitation Analyst. OR - 4 years of experience in the SIGINT community as a Target Digital Network Analyst or Digital Network
Exploitation Analyst.
4. Demonstrated experience in at least three of the following: - Correlation of data from multiple sources, including host, network, user, and intelligence reports to
uncover threats. - Collection, aggregation, and interpretation of log data from various sources. - Configuration, management, and optimization of Network Intrusion Detection Systems and Host-based
Intrusion Detection Systems to include fine-tuning security rule sets for tools such as Suricata, Snort,
Yara, and Sigma. - Deep packet inspection and identification of malicious traffic using packet analysis tools, such as
Wireshark or Network Miner. - Threat hunting to identify advanced persistent threats and zero-day vulnerabilities using various threat
hunting methodologies.
Date Posted: 07 June 2024
Apply for this Job