Overview

Key Role:

Provide technical and operational support to client partner agencies and assist clients and partner agencies with analyzing network traffic and performing log analysis, counterintelligence analysis, and data mining. Apply expertise in cyber threats to the DoD and law enforcement computer network, including attack and exploitation techniques, computer-based intrusions, and incident response and investigation. Conduct focused analysis of especially complex and unusual issues to support a client in evaluating the significance of the information collected, extract and further disseminate relevant counterintelligence and cyber threat information, identify operational opportunities and leads, provide guidance to case agents, and coordinate actions within the intelligence and law enforcement communities. Work with client leadership to shape the analytical process to meet client needs. Develop and project data, draw conclusions, and estimate probabilities based on expertise in current and past intelligence situations and the significance of the conditions and threats, at times, under conditions of urgency. Gather, interpret, and review unclassified and classified intelligence community (IC)-generated reports, analytical assessments, and other intelligence products to assess the relevance and significance of developments in an assigned area of responsibility. Present findings and recommendations to superiors and act as a facilitator and liaison between technical experts and other government analysts and special agents.

Basic Qualifications:

  • 5+ years of experience in a cybersecurity role, including threat analyst, reverse engineering analyst, or network attack analyst.

  • Knowledge of cyber threats within law enforcement or the DoD

  • Ability to work independently with minimal supervision

  • Active Top Secret clearance

  • HS diploma or GED

Additional Qualifications:

  • Experience with scripting or programming languages, including Bash scripting, Perl, and Python

  • Knowledge of basic internet protocols, including TCP/IP

  • Ability to analyze network traffic data for anomalous or malicious content with tools, including Wireshark, NetworkMiner, Dshell, tcpdump, and tshark

  • Possession of excellent oral and written communication skills, including techniques to produce tactical and strategic level products and participate in DoD and IC working groups

  • BA or BS degree

  • Security+, CEH, or CISSP Certification

Clearance:

Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Top Secret clearance is required.

We’re an EOE that empowers our people-no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristics-to fearlessly drive change.