Benefits: 401(k) 401(k) matching Competitive salary Dental insurance Employee discounts Health insurance Paid time off Vision insurance Responsibilities include but are not limited to: • Ensure Reporting Excellence & Process Adherence: Guarantee the completion of accurate and timely reports, ensuring all processes and activities align with established timeframes and standard operating procedures. • Provide Comprehensive CI Cyber Support: Offer written and technical analysis to support teammates in completing forensic reports, CI Cyber inquiries, and all recurring monthly, quarterly, and annual CI Cyber Threat reports, contributing to a deeper understanding of specific threats. • Conduct Threat Detection and Analysis: Detect anomalous network activity through data analysis, evaluate intrusion detection systems, incident tickets, event and log analysis, and security change tracking. Perform thorough threat analysis, generate forecasts and alerts, and recommend effective countermeasures. • Investigate Malicious Code and Mitigate Risks: Investigate instances of malicious code to determine attack vectors, payloads, origins, and the extent of damage or data exfiltration. Identify risks to computer systems and propose corrective actions or software recommendations to mitigate malware intrusions. • Develop Requirements and Document Best Practices: Identify, analyze, define, and coordinate user, customer, and stakeholder needs, translating them into technical requirements. Document best practices, lessons learned, processes, and procedures for quality assurance. • Collaborate and Liaise for CI Cyber Mission: Collaborate extensively with internal NGA teams (including the CI Office, Insider Threat, and CSOC) and external IC/Cyber community members. Participate in technical meetings and working groups to address malware threats and vulnerabilities, and coordinate CI Cyber activities stemming from Enterprise Incident Response Events. • Lead Malware Threat Awareness and Program Development: Assist in developing and delivering malware threat awareness products and briefings. Work independently to drive the development of a premier malware program through active collaboration with computer security and CI investigators, forensic analysts, and other relevant organizations. Minimum Qualifications: • Shall possess a minimum of 7 years Network Analysis experience. • Shall identify, decipher, and understand network artifacts. • Possess or obtain certification to comply with DoD 8570.01-M Information Assurance (IA) requirements within one calendar year of assignment. Shall possess or obtain and maintain IA III certification. Desired Qualifications: • Be a credentialed graduate of an accredited federal or DoD CI training academy. • Possess a Bachelor’s degree in a Science, Technology, Engineering or Mathematics discipline. • Possess a DoD Cyber Crimes Investigator certification. • Possess a post-graduate degree in a Science, Technology, Engineering or Mathematics discipline. • Experience with malware analysis. • Possess knowledge and understanding of foreign adversaries’ security and intelligence services, terrorist organizations, and threats posed to US Gov. • Possess ability to coach teammates to achieve objectives. • Possess ability to monitor and track progress towards achievable measures. Clearance Requirements: · Must have a TS/SCI with the ability to pass a CI Poly Physical Requirements: The person in this position must be able to remain in a stationary position 50% of the time. Occasionally move about inside the office to access file cabinets, office machinery, or to communicate with co-workers, management, and customers, via email, phone, and or virtual communication, which may involve delivering presentations.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level