Cyber Intelligence Analyst

PeratonLinthicum, MD
18d$112,000 - $179,000

About The Position

The Cyber Threat Intelligence position supports our government customer, where you will focus on researching and evaluating technical and all-source intelligence with specific emphasis on cryptocurrency transactions and counter-threat finance. Your analysis of threat data from various sources and network events will directly impact current operations, and your all-source research will determine adversary capabilities and intent. You will prepare assessments and briefings for Law Enforcement (LE), Counterintelligence (CI) and the Intelligence Community (IC) partners. Your role will also involve developing and maintaining analytical procedures to meet evolving requirements and ensure optimal effectiveness. This position supports multi-domain operations by preparing intelligence assessments, technical information papers, and threat profiles of current events based on the collection, research, and analysis of fused intelligence products while enhancing threat data from various sources. The analyst develops and maintains analytical procedures to meet changing requirements and ensure uninterrupted operations. Responsibilities include researching data using a combination of standard intelligence methods and business processes, producing papers, presentations, recommendations and findings for senior government intelligence and network operations officials. Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Requirements

  • Active TS/SCI with Poly eligibility.
  • Minimum 8 years with BS/BA, 6 years with MS/MA, 3 years with PhD.
  • A degree in one of the following fields is highly desired: Information Technology, Information Security, Computer Science, Intelligence Studies, Cyber Security or another related field of study.
  • Must be familiar with aspects of cryptocurrency tracing.
  • Requires experience providing integration of cryptocurrency analysis to support national security, criminal, and counterintelligence investigations and operations.
  • Experience with Law Enforcement/Counterintelligence (LE/CI) Operations and/or Cyberspace Operations.
  • Must have experience developing and presenting high-level briefings for Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership.
  • Must have experience drafting and editing authoritative and finished intelligence, including IC assessments, executive summaries, information papers, and other papers on key topics to prepare senior leaders for senior DoD, Inter-Agency, and international meetings.

Responsibilities

  • Researching and evaluating technical and all-source intelligence with specific emphasis on cryptocurrency transactions and counter-threat finance
  • Analysis of threat data from various sources and network events
  • All-source research to determine adversary capabilities and intent
  • Preparing assessments and briefings for Law Enforcement (LE), Counterintelligence (CI) and the Intelligence Community (IC) partners
  • Developing and maintaining analytical procedures to meet evolving requirements
  • Preparing intelligence assessments, technical information papers, and threat profiles of current events based on the collection, research, and analysis of fused intelligence products while enhancing threat data from various sources
  • Researching data using a combination of standard intelligence methods and business processes
  • Producing papers, presentations, recommendations and findings for senior government intelligence and network operations officials
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service