Vacancy expired!
- Requires 8 to 10 years with BS/BA or 6 to 8 years with MS/MA or 3 to 5 years with PhD.
- Bachelors degree (or equivalent) in CS, IS, Comp Engineering, or Math
- Minimum of decree plus six years of direct experience in Intelligence Community cyber analysis or cyber targeting (e.g. selectors targeting, monitoring, behavior analysis or verification, reporting, technical analysis, or counterintellingence)
- Demonstrated proficiency with Splunk and Python
- Proven ability to research and analyze data from a variety of sources and to present findings in clear and concise written reports
- Demonstrated working knowledge of telecommunications protocols
- Demonstrated working knowledge of IC data sets and tools for telecommunications analysis
- Demonstrated ability to work well with teams or individually with minimal supervision
- Masters degree in Computer Science, Information Systems, Cyber Security, Computer Engineering, Information Assurance, or related technical field
- Familiarity with other IC agencies
- Computer network defense experience
- Relevant certification (CISSP, CCNA, CEH, etc.)
- Experience with operational communications
- Conducts research and evaluates technical and all-source intelligence with specific emphasis on user behavior and patterns in a dynamic and changing mission environment.
- Detects anomalous activity in raw and processed log files for deeper exploration using IC tools and databases. Differentiates between general and targeted or suspicious scanning.
- Identifies trends cyber systems and performs behavior analysis. Uses Splunk dashboards to create alerts and investigate log files.
- Correlates threat data from various sources.
- Writes concise assessments that highlight findings supported by evidence, articulating the impact of conclusions.
Vacancy expired!