• Cyber All-Source Threat Analyst

    Job Locations US-VA-Charlottesville
    # of Openings
  • Overview

    The Contractor shall provide non-personal services necessary to support the U.S. Army National Ground Intelligence Center (NGIC) to provide Cyber Analysis services as defined in this Performance Work Statement (PWS).



    NGIC provides All-source Intelligence on foreign ground forces and their capabilities and related military technologies and integrates with Mission Partners to ensure the U.S. Army, Department of Defense (DoD), Joint, and National level decision makers maintain decision advantage to protect the U.S. and interests abroad. NGIC is the Defense Department’s primary producer of ground forces intelligence. NGIC produces scientific and technical intelligence and military capabilities analysis on foreign ground forces required by warfighting commanders, the force modernization and research and development communities, DoD, and national policymakers. Under its assigned Defense Intelligence Analysis Program (DIAP) lanes, NGIC is directed to produce all-source intelligence products to understand the threat to U.S. ground forces. NGIC has been directed to produce all-source intelligence products for Cyber Analysis.



    Work as a cyber all-source intelligence threat analyst, as an integral part of a diverse contract team supporting a DoD Scientific and Technical Intelligence (S&TI) client.  Provide the required experience and expertise to perform in-depth technical research, analysis, and assessment of foreign cyber technologies, capabilities, and threats to US ground force systems, combat support systems, and operations in response to Production Requirements and Requests for Information from DoD or Service Combatant, Functional, Acquisition, and Research & Development Commands.


    Basic Qualifications:
    - 5+ years of experience conducting all-source Scientific and Technical Intelligence (S&TI) research, analysis, and production in support of DoD or US Government agencies/commands/organizations
    - Ability and experience authoring concise, in-depth, well-sourced intelligence assessments and RFI responses in conformance with intelligence community (IC) analytic standards
    - Ability to research, create, develop, and deliver professional briefings and multimedia presentations
    - Knowledge of the intelligence cycle, and the process for all-source intelligence research, analysis and production
    - Knowledge of current and emerging cyber threat technologies, capabilities and methodologies
    - Knowledge of current and emerging cybersecurity technologies and methodologies
    - Knowledge of current and emerging computer, computer networks, and communications networks technologies, designs and programs
    - Ability to interact, collaborate and coordinate with small groups on intelligence data and information requirements, and research, analysis and production
    - Possession of excellent oral and written communication skills
    - Familiarity with, and experience utilizing, all intelligence sources (Cyber, IMINT, SIGINT, OSINT, and HUMINT, etc.)
    - Familiarity with, and experience utilizing, current intelligence databases, networks, libraries, and exploitation/analysis tools (such as, WEBTAS, Analytical Notebook, DCSG-A, GIS tools and M3)
    - Knowledge of USG intelligence organizations (DIA, NSA, CIA, Service Intelligence Centers, USCYBERCOM, ARCYBER), programs, and products
    - BA or BS degree; in some cases an Associates’ degree and 5 years relevant experience may be substituted for Bachelor’s degree requirements.


    Additional Qualifications:
    - Knowledge of foreign ground force military systems
    - Previous military experience supporting all source intelligence analysis
    - U.S. Army or INSCOM experience
    - MA or MS degree in Computer Science
    - Certified Ethical Hacker (CEH) Certification
    - CompTIA Security+ Certification
    - CompTIA Network+ Certification
    - Certified Intelligence Systems Security Professional (CISSP) Certification


    Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; TS/SCI clearance is required.


    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed