Cyber Threat Analyst, Senior Key Role: Be responsible for analyzing and assessing foreign cyber operations, threat environments, and technical requirements. Characterize current foreign cyber capabilities and project future cyber systems and all-domain cyber systems to highlight the threat to the National Security Space Enterprise. Apply knowledge of cyber threats, networks, and technology when using Intelligence Community (IC) tools and databases to identify, extract, and analyze pertinent information, and provide technical analysis to support protection initiatives. Integrate cyber into the targeting, planning, and overall military strategy. Develop cyber order of battle, target information and products, intelligence, and target selection standards. Perform red tech scouting and track emerging threats, vulnerabilities, and trends by monitoring various internal and external sources, including Publicly Available Information or Commercially Available Information, formal intelligence reports, social media, proprietary threat feeds, network traffic logs, and alerts. Characterize blue modes and methods of battlefield communications vulnerable to adversary cyber-attacks. Identify cyber tactics used to mitigate C5ISR architectures. Engage IC partners to develop integrated analysis plans, solicit further insights, and collaborate on additional research. Identify information gaps and threat information needs to task IC entities via standard IC tasking processes and requests for information tools to influence and prioritize the IC Tasking, Collection, Processing, Exploitation, and Dissemination process. Author and coordinate threat assessment products on foreign cyber capabilities combining intelligence information and Department of Defense (DoD) technical and operations analysis in collaboration with IC and DoD partners. Analyze beyond incident response to hardening of the environment of future space architecture, involving performing periodic risk analysis and penetration tests to identify exploitable weaknesses of space assets. Search proactively for undetected and evolving threats through analysis, and be responsible for fixing vulnerabilities and reporting proper security measures as recommendations.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level