GovCIO is currently hiring for a Business Analyst to support the design and implementation of a Zero Trust Architecture. This position will be located at Langley AFB in Hampton, VA and will be an onsite position. Responsibilities Responsible for combining business analysis principles with military intelligence and operations to improve the efficiency and effectiveness of intelligence processes and procedures that comply with and/or support the Zero Trust security model, which assumes no user or device is inherently trusted, even if they are within the network perimeter. This role is focused on the "how" of intelligence operations, analyzing workflows and systems to identify inefficiencies and make data-driven recommendations. Process analysis and optimization: Map, document, and analyze “as is” intelligence collection, analysis, and dissemination processes to “to be” processes identifying bottlenecks and areas for improvement. Requirements gathering: Elicit and document detailed business requirements from military and intelligence stakeholders and act as a liaison between operational users and technical teams, translating intelligence needs into technical specifications. Performance monitoring and reporting: Define and track key performance indicators (KPIs) related to intelligence processes and operational outcomes and develop management reports and dashboards to provide situational awareness. Policy and doctrine development: Provide analysis to support the development and revision of military policy, and tactics, techniques, and procedures (TTPs) related to intelligence operations. Training and change management: Support the transition to new processes by developing documentation and training materials for intelligence personnel and communicate process changes and their benefits to stakeholders Responsible for combining business analysis principles with military intelligence and operations to improve the efficiency and effectiveness of intelligence processes and procedures that comply with and/or support the Zero Trust security model, which assumes no user or device is inherently trusted, even if they are within the network perimeter. This role is focused on the "how" of intelligence operations, analyzing workflows and systems to identify inefficiencies and make data-driven recommendations. Process analysis and optimization: Map, document, and analyze “as is” intelligence collection, analysis, and dissemination processes to “to be” processes identifying bottlenecks and areas for improvement. Requirements gathering: Elicit and document detailed business requirements from military and intelligence stakeholders and act as a liaison between operational users and technical teams, translating intelligence needs into technical specifications. Performance monitoring and reporting: Define and track key performance indicators (KPIs) related to intelligence processes and operational outcomes and develop management reports and dashboards to provide situational awareness. Policy and doctrine development: Provide analysis to support the development and revision of military policy, and tactics, techniques, and procedures (TTPs) related to intelligence operations. Training and change management: Support the transition to new processes by developing documentation and training materials for intelligence personnel and communicate process changes and their benefits to stakeholders Responsible for content, processes, and procedures related to vendor and in-house developed applications. Documenting functional requirements, analyzing process requirements, implementing business process improvement efforts, and working with production issues.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Education Level
High school or GED
Number of Employees
501-1,000 employees