Jobs at CEdge Inc

View all jobs

CI Cyber Threat Analyst support (Level IV)

Washington, DC
CEdge has an opportunity for a  CI Cyber Threat Analyst support (Level IV)  , located in  Washington If you are ready to work alongside World Renowned Technology experts, and carry the skills below, this is the opportunity that will inevitably take your career to unbelievable levels!

***This position requires a TS/SCI Security Clearance***

Overall Assignment Description: The senior Contractor CI Cyber Threat Analyst will ensure all required reports are complete with minimal errors and that all processes, activities, and reports are conducted with in established time frames. He or she will also ensure analysts are trained in and follow current standard operating procedures. They will contribute to the following annual production requirements:
 
Duties:
  • Produce weekly actionable Technical CI (Cyber) status reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly cyber status reports, each report due NLT 0800 each Monday morning. Status reports will include (as applicable):
    • Threat data collected and reported by NGA Technical CI team and network security personnel.
    • Intelligence reported by the Intelligence Community.
    • Fusion of all source threat analysis derived from multiple intelligence sources (INTs).
    • Imagery when available.
    • Information that can be used to inform security decisions.
  • Produce monthly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide a monthly threat report for the months not falling on the quarterly report month or the annual report month. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include:
    • Compilation of data collected and reported in weekly products.
    • Intelligence reported by the Intelligence Community.
    • Fused All Source threat analysis derived from multiple INTs.
    • Imagery when available.
    • Depiction of Technical CI threat (s) to NGA to inform security decision makers.
  • Produce quarterly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include:
    • Compilation of data collected and reported in weekly and monthly products.
    • Intelligence reported by the Intelligence Community.
    • Fused all source threat analysis derived from multiple INTs.
    • Include imagery when available.
    • Depiction of Technical CI threat (s) to NGA to inform security decisions.
  • Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 1 December. Threat studies should include:
    • Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products.
    • Raw and finished Intelligence reported by the Intelligence Community.
    • Fused all source threat analysis derived from multiple INTs.
    • Include imagery when available.
    • Analytic judgments, intelligence gaps, and overall technical threat(s) to NGA.
  • Produce IIRs from data collected and reported by either the Technical CI team, NGA cyber security personnel, or partner agencies. Provide a minimum of 9 IIRs within Fiscal year. Effective IIR writing requires:
    • Coordination with teammates and stakeholders to ensure accuracy of reported information.
    • Cross referencing local information reporting with Intelligence Community reporting.
    • Clear and concise writing to briefly convey threat.
    • Responsiveness to Intelligence Community priority collections requirements.
    • Timeliness.
    • Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE or Criss Cross).
  • Provide Technical CI advice and expertise in support of CI inquiries, operations and issues.
  • Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.
  • Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers.
  • Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner.
  • Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.
  • Demonstrate current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats.)
  • Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.
  • Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.
  • Display an ability to collaborate with internal NGA and external IC/Cyber community members.
  • Coordinate CI Cyber activities originating from Enterprise Incident Response Events.
  • Conduct liaison between CI Office, Insider Threat, Cyber Security Operations Center (CSOC), other NGA Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission.
  • Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures.
  • Skills and Experience:
    Required:
  • Shall possess a minimum of 11 years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations.
  • Possess or obtain certification to comply with DoD 8570.01-M Information Assurance (IA) requirements within one calendar year of assignment at the sole expense of the vendor. Shall possess or obtain and maintain IA II certification. See DoD 8570.01-M for acceptable certifications for each IA level.
  • Desired:
  • Be a credentialed graduate of an accredited federal or DoD CI training academy.
  • Possess a Bachelor’s degree in Science, Technology, Engineering or Mathematics disciplines.
  • Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines.
  • Possess knowledge and understanding of foreign adversaries’ security and intelligence services, terrorist organizations, and threats posed to US Gov.
  • Experience translating Government vision into understandable and achievable measures.
  • Experience in using supervisory skills to coach teammates to achieve objectives
  • Monitor and track progress towards achievable measures.
WHAT’S IN IT FOR YOU?
  • Full Benefits Package
  • 10 Days PTO
  • 10 Paid Holidays
  • 401K
WHO ARE WE?
CEdge Software Consultants is an innovative IT consulting firm, and a strategic business partner. We offer IT solutions to Federal and State government, as well as, Commercial Enterprises throughout the United States. Our main objective is to create an integrity-based culture that takes pride in working as a collaborative team that focuses on growth and is driven by the desire to provide purely ethical services for both our clients and teammates
 
 

Share This Job

Powered by