Cyber Analyst (Junior) - TS/SCI

WiserQuantico, VA
3dOnsite

About The Position

Wiser offers innovative solutions to clients in the public, private, and government sectors. We combine technology and expertise to develop inventive solutions that deliver quality results and aid in critical decision making. With the flexibility and efficiency of a small business, we provide nimble responsiveness with the low risk and strong performance experience of an established GEOINT and Geospatial service provider.

Requirements

  • Active Top-Secret security clearance at time of application
  • Minimum 3 years of experience with cyber systems analysis, with at least a portion of the experience within the last 2 years.
  • Bachelor's degree in an area related to cyber.
  • An additional 4 years of cyber experience, for a total of 7 years of experience in cyber, may be substituted for a Bachelor's degree.

Responsibilities

  • Assess the cybersecurity posture of a USMC defense program, ensuring the program is evolving with the best cybersecurity practices, prioritizing cyber threats based on factual cyber analysis.
  • Analyze foreign capabilities to detect, disrupt, and deny USMC emissions and signals throughout the cyber kill chain, to include, but not limited to emissions from targeting, communications, and intelligence, surveillance, and reconnaissance (ISR) assets, reversible and non-reversible attacks.
  • Identify, monitor, and assess advancements in emerging and commercial technologies that could be employed by state and non-state actors to detect, disrupt, and deny USMC acquisition programs' network infrastructure.
  • Identify significant risk characteristics of the environment such as classification of network, baseline activity, architecture, operating system, services, connectivity and bandwidth.
  • Identify the limits of the network to be collected against.
  • Establish limits of the supporting or connected networks that may need to be collected against.
  • Evaluate existing databases and identify intelligence gaps.
  • Use open source to gather Publicly Available Information (PAI).
  • Explore the physical battlespace; how could the environment affect tactical operations.
  • Define the battlespace effects.
  • Analyze the battlespace environment for information, services and networks, such as confidentiality, integrity, availability; and protect, detect, respond, restore and conduct reviews.
  • Analyze other characteristics of the battlespace such as security, auditing procedures, and backup systems.
  • Evaluate the adversary on physical location of all assets, architecture and automation skills, security and policies, baseline activity, peculiarities and vulnerabilities, capabilities, and conclusions that address: Rules of Engagement (ROE) for Information Assurance (IA), Computer Network Defense (CND) and Computer Network Attack (CNA)
  • Determine adversary's Courses of Action (COA).
  • Identify the adversary's likely objectives and desired end state.
  • Identify the full set of COA's available to the adversary, at a minimum the most likely and most dangerous should be developed.
  • Develop COA's based on enemy perception of friendly information architecture (reverse cyber IPB).
  • Evaluate and prioritize each adversary COA.
  • Continue to refine COA's as time and new information allow.
  • Evaluate foreign Computer Network Defense (CND) and Computer Network Attack (CNA) capabilities, limitations, and vulnerabilities.
  • Assess potential vulnerabilities of USMC tactical systems to CNA to include systems related to targeting, ISR, and navigation assets
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service