Cyber Intel Analyst in Fort Meade, MD at APEX Systems

Date Posted: 8/5/2018

Job Snapshot

  • Employee Type:
    Contractor
  • Job Type:
  • Experience:
    Not Specified
  • Date Posted:
    8/5/2018

Job Description

Job #:  836745

Apex Systems Inc., is immediately seeking a Cyber Intel Analyst who is a self-starter, highly organized, is comfortable speaking with high ranking military personnel, and has a strong drive for quality. This position will support one of our highly regarded clients in the government arena, and offer a strong upside for growth.

 

Client: Enterprise Government Integrator

Location: Fort Meade, MD

Compensation: Competitive based on years of relevant experience

Clearance: Able to maintain an active TS/SCI Clearance with the DOD

Job Description
The selected candidate shall provide subject matter expertise while producing and disseminating all-source integrated intelligence analysis to support DoDIN and defensive cyberspace operations (DoDIN/DCO-Internal Defensive Measures) planning, integration, coordination, and execution. The candidate shall assist in analyzing ongoing threat related activities and information targeting the DoDIN and develop Joint Intelligence Preparation of the Operational Environment (JIPOE) for a cyber-functional area of responsibility. The Analyst will evaluate operational information, intelligence assessments and reports, Computer Emergency Response Team, Law Enforcement/Counterintelligence, allied/coalition, and open-source information to assess potential impacts on the DoDIN and alert the DoDIN staff and leadership.

  • Produce and disseminate all-source integrated intelligence analysis to support DODIN and defensive cyberspace operations (DODIN/DCO-internal Defensive Measures) planning, integration, coordination, and execution. Assist in analyzing ongoing threat related activities and information targeting the DODIN and develop Joint Intelligence Preparation of the Operational Environment (JIPOE). Make recommendations for DODIN action to protect the DODIN.
  • Provide all-source analytical support to DODIN/DCO to include production of cyber related Intelligence Estimates.
  • Produce special reports and assessments related to specific incidents and trends concerning threats to the DODIN as required.
  • Conduct analysis to identify indications of adversary activity and warn (Indications and Warning) leaders of potential threats, cyber developments, events or conditions that may adversely affect the DODIN; advising leaders in order to proactively confront emerging challenges, leverage opportunities, avoid surprise and produce strategic outcomes favorable to the U.S. or allied interests.
  • Respond to the J2 for threat identification of activity directed against DoD systems.
  • Evaluate international events, all-source and open-source intelligence, and operational information to assist in the assessment of potential impacts to the DODIN and alert the JFHQ-DODIN Staff and Leadership to potential network exploitation or attacks. Using these techniques and taking advantage of web-based research tools, match potential threat candidates with identified activity, produce reports and/or briefs, and make intelligence-derived recommendations to the J2/J3 for the defense of the affected network.
  • Develop and present in-depth intelligence briefings and presentations concerning nation-state and non-state actor capabilities and activities, specific actor profiles, and incidents affecting DoD communications networks.
  • Assist the J2 in the management of daily intelligence reports, bulletins and web sites on the classified networks.
  • Maintain communications as directed by the J2, with intelligence representatives at JFHQ-DODIN, Service components, other Combatant Commands, Department of Homeland Security, National Infrastructure Protection Center (NIPC), Intelligence Community, Joint Staff J2/JCS, DODIN service providers, and other organizations as designated
  • This position is a shift work position and could require you to work Day shift, OR Afternoons, OR Overnight, OR weekend days.
    • Schedules will be either 4 days x 10 hours a week (M-TH) OR 3 days x 13 hours a week (F-Sun)

Basic Qualifications:

  • Active TS/SCI security clearance
  • Bachelor's degree in a relevant technical discipline and 6-8+ years of overall related experience. 4+ years of additional related years of experience is accepted in lieu of a degree.
  • Must have experience performing Intelligence all-source analysis; Defense Intelligence Analysis Program; intelligence writing and briefing at a senior level
  • Ability to place threats in the proper context and identify the “so what” for decision makers; ability to communicate technical information to non-technical audiences
  • Must have a Technical understanding in the following areas:
    • network communication using TCP/IP protocols
    • basic system administration
    • basic understanding of malware (malware communication, installation, malware types)
    • intermediate knowledge of computer network defense operations (proxy, firewall, IDS/IPS, router/switch, open source information collection)
  • Experience providing cyber threat characterization and indications and warning of threats
  • Ability to apply formal intelligence analysis methods, develop hypothesis, prove/disprove relationships, always ask “why”, defend your analysis, and apply attribution to cyber threat activity
  • Familiar with the DoD, Intelligence Community, and private sector cyber community
  • Strong working ability with all MS Office applications (Word, PowerPoint, Excel, Project, etc.)

 

Preferred Qualifications

  • Experience applying Kill Chain analysis, Cyber Intelligence Preparation of the Environment (CIPE) modeling, or Diamond modeling of cyber threat activity
  • Understanding of defensive cyber operations to include incident response
  • Experience with joint and combined military exercises
  • Analyst experience in any Federal Cyber Center (NCTOC, IC-SCC, Cyber Command, CNMF, CPT, JFHQ-Cyber, NCIJTF, DHS US CERT) or Corporate CIRT
  • Any type of cyber related law enforcement or counterintelligence experience
  • Recent experience performing NETFLOW or PCAP analysis using analysis tools (Wireshark, SourceFire, etc)
  • Experience using ArcSight, FireEye, or other SIEM tools
  • Hold one or more of the below certifications:
    • SANS: GIAC Certified Intrusion Analyst (GCIA) or GIAC Certified Incident Handler (GCIH) 
    • (ISC)² Certified Information Systems Security Professional (CISSP)
    • CompTIA Advanced Security Practitioner (CASP)
    • CompTIA Security+, Network+
    • EC-Council Certified Ethical Hacker (CEH)

 

 

 

 

 

 

 

 

EEO Employer

Apex is an Equal Employment Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other characteristic protected by law. Apex will consider qualified applicants with criminal histories in a manner consistent with the requirements of applicable law. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation in using our website for a search or application, please contact our Employee Services Department at or 844-463-6178.