Senior Intelligence Analyst with Security Clearance

Maryland

Strategic Resilience Group
Apply for this Job
SRG is seeking an experienced Senior Intelligence Analyst to join our team of Cyber Operation Analysts and Subject Matter Experts (SMEs) to support planning, coordination, synchronization, and execution of offensive cyberspace operations in support of aligned combatant command and designated sub-unified commands. This includes a deep understanding and experience in the employment of available cyberspace capabilities as well as the creation of future cyberspace capabilities. Tasking will include comprehensive cyber support for cyberspace operations planning and intelligence analysis at Joint Force Headquarters level.
Roles and Responsibilities:
The Senior Intelligence Analyst will perform the following functions:

• Support the intelligence collection process and inter-office communications between the United States Intelligence Community, organic collections teams and multiple supported military headquarters Intelligence centers at the TS/SCI level.

• Contribute to the creation of intelligence collections strategy, develop intelligence indicators and submit collection requirements to theater and national intelligence activity and support the triage and dissemination of information to the appropriate consumer.

• Advise the Intelligence Officer and Operations Officer and other groups in the planning, coordinating and submission of intelligence requirements across a variety of interests. Required Qualifications: 1. TS/SCI with counterintelligence (CI) polygraph.
2. 2 years of experience as an instructor in threat analysis or 3 years of experience in a leadership position, with 4 or more direct reports, in an organization such as a Security Operations Center, a Cyber Emergency Response Team, a Cyber Protection Team/Blue Team or a Red Team/Cyber Mission Team.
3. Demonstrated experience training and developing subordinates on foundational areas such as network and host analysis, JQR, Mission qualification, and KSA's related to their assigned work role.
4. Demonstrated Experience in the following: - Correlation of data from multiple sources, including host, network, user, and intelligence reports to
uncover threats. - Collection, aggregation, and interpretation of log data from various sources. - Configuration, management, and optimization of Network Intrusion Detection Systems and Host-based
Intrusion Detection Systems to include fine-tuning security rule sets for tools such as Suricata, Snort,
Yara, and Sigma. - Deep packet inspection and identification of malicious traffic using packet analysis tools, such as
Wireshark or Network Miner. - Threat hunting to identify advanced persistent threats and zero-day vulnerabilities using various threat
hunting methodologies. - Provide input into DCO mission products such as pre-mission planning briefs, situation reports, post
mission documentation, after action reports and lessons learned at the conclusion of events such as
operations, exercises, and training. - Integration and management of SIEM and SOAR platforms, such as Elastic, Splunk, Sentinel, and other
open-source or government provided solutions.
5. Individual should meet DODM 8570.01 IAT Level III position requirements.
6. Bachelor's degree or higher in Computer Science, Software Engineering, or Computer Engineering from an accredited college or university and 6 years of experience in the degree fields. OR - Global Information Assurance Certification (GIAC), Certified Forensics Analyst (GCFA) Certification or
GIAC, Certified Intrusion Analyst (GCIA) Certification with 10 years of experience in both Host analysis and
Network analysis. OR - 12 years of experience as a Threat Analyst with experience in both Host analysis and Network analysis. OR - 12 years of experience in Offensive Cyber Operations as an Interactive Operator on-Network (ION) or
Exploitation Analyst (EA).
Date Posted: 18 May 2024
Apply for this Job