Cyber Intelligence Analyst
Location
Vicenza | Italy
Job description
Job Description
Responsibilities
As a Cyber Intelligence Analyst, you will support US Army Europe/Africa G2 and other Intelligence related mission partners, as a key team member of a complex program that provides professional services in support of advisory and analysis efforts associated with Intelligence Warfighting Function (IWfF)mission areas. The USAREUR-AF Team will research, analyze, and produce near- and long-term all source assessments on terrorism / counterterrorism, and multi-discipline counter-intelligence issues in response to CG USAREUR-AF’s priority intelligence requirements and to enable U.S. and foreign partner counterintelligence operations. You will be a member of a team that supports the Intelligence Directorate of the Army Component Command of both the US European Command and US Africa Command.
You will embed in either Wiesbaden Germany OR Vicenza Italy and may travel within the theaters as required.
- Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products, such as threat assessments, briefings, intelligence studies, and country studies.
- Generate requests for information and monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc., as related to designated cyber operations warning problem sets.
- Answer requests for information and provide subject matter expertise to the development of a common operational picture.
- Maintain a common intelligence picture and provide subject matter expertise to the development of cyber operations specific indicators.
- Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities, including identifying intelligence collection shortfalls.
- Brief threat and/or POI current situations and collaborate with intelligence analysts/POI organizations involved in related areas.
- Conduct in-depth research and analysis, including nodal analysis, and develop information requirements necessary for answering priority information requests.
- Evaluate threat decision-making processes and identify threats to Blue Force vulnerabilities.
- Generate requests for information and monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc., as related to designated cyber operations warning problem sets.
- Monitor and report on validated threat activities, including monitoring open-source websites for hostile content directed towards organizational or partner interests.
- Monitor the operational environment and report on adversarial activities that fulfill leadership's priority information requirements.
- Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products, such as threat assessments, briefings, intelligence studies, and country studies.
- Provide subject-matter expertise and support to planning/developmental forums and working groups as appropriate.
- Provide current intelligence support to critical internal/external stakeholders as appropriate, utilizing effective communication through verbal, written, and/or visual means.
- Accurately and completely source all data used in intelligence, assessment, and/or planning products and articulate intelligence requirements into well-formulated research questions and data tracking variables.
- Develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
- Effectively collaborate via virtual teams and evaluate information for reliability, validity, and relevance.
- Evaluate, analyze, and synthesize large quantities of data into high-quality, fused POI/intelligence products, focusing research efforts to meet the customer's decision-making needs.
- Function effectively in a dynamic, fast-paced environment and in a collaborative environment, seeking continuous consultation with other analysts and experts to leverage analytical and technical expertise.
- Identify intelligence gaps, recognize, and mitigate cognitive biases, and detect and mitigate deception in reporting and analysis.
- Think critically and think like threat actors, utilizing multiple intelligence sources across all disciplines.
- Apply knowledge of computer networking concepts and protocols, network security methodologies, risk management processes, and laws, regulations, policies, and ethics related to cybersecurity and privacy.
- Understand cyber threats, vulnerabilities, and specific operational impacts of cybersecurity lapses.
- Apply knowledge of human-computer interaction principles and network traffic analysis methods.
- Apply knowledge of a wide range of communications media and physical computer components and architectures.
- Understand cyber-effect stages and website types, administration, functions, and content management systems.
- Understand effect methods and techniques, classification and control markings standards, and common computer/network infections and methods of infection.
- Apply knowledge of computer networking fundamentals, current computer-based intrusion sets, and cyber intelligence/information collection capabilities and repositories.
- Understand cyber operations terminology/lexicon, data communications terminology, encryption algorithms, and evolving/emerging communications technologies.
- Understand the fundamental concepts, principles, capabilities, limitations, and effects of cyber operations and general Supervisory control and data acquisition (SCADA) system components.
- Apply knowledge of host-based security products and their impact on exploitation and vulnerability reduction.
- Understand Internet applications, the impact of modern digital and telephony networks on cyber operations, and how modern wireless communications systems impact cyber operations.
- Apply knowledge of extracting, analyzing, and using metadata, intelligence disciplines, and intelligence preparation of the environment processes.
- Understand intelligence support to planning, execution, and assessment, as well as internal tactics to anticipate and/or emulate threat capabilities and actions.
- Apply knowledge of Internet network addressing, malware, operations security, organizational hierarchy and cyber decision-making processes, and physical and logical network devices and infrastructure.
- Understand telecommunications fundamentals, the structure and design of modern communication networks, and network security basics.
- Apply knowledge of networking and routing protocols, services, and the ways in which POIs or threats use the Internet.
- Understand virtualization products, what constitutes a ""threat"" to a network, and wireless technologies and their architecture and design.
- Conduct non-attributable research and research using the deep web.
- Define and characterize all pertinent aspects of the operational environment, develop, or recommend analytic approaches or solutions, and evaluate information for reliability, validity, and relevance.
- Identify alternative analytical interpretations, critical POI elements, and prepare and present briefings.
- Provide understanding of POI or threat systems through identification and link analysis, tailor analysis to necessary levels, and use Boolean operators and multiple analytic tools, databases, and search engines.
- Utilize feedback to improve processes, products, and services and utilize virtual collaborative workspaces and/or tools.
Qualifications
Required:
- BS 10-12, MS 8-10, PhD 5-7
- Must POSSESS and be able to maintain aTS/SCI clearance
Equal Pay Act
This is the projected compensation range for this position. There are differentiating factors that can impact a final salary/hourly rate, including, but not limited to, Contract Wage Determination, relevant work experience, skills and competencies that align to the specified role, geographic location (For Remote Opportunities), education and certifications as well as Federal Government Contract Labor categories. In addition, Arcfield invests in its employees beyond just compensation. Arcfield ’s benefits offerings include, dependent upon position, Health Insurance, Life Insurance, Paid Time Off, Holiday Pay, Short Term and Long-Term Disability, Retirement and Savings, Learning and Development opportunities, wellness programs as well as other optional benefit elections.
Min: $102,406.49 - Max: $246,081.26
EEO Statement
Arcfield proactively fulfills its role as an equal opportunity employer. We do not discriminate against any employee or applicant for employment because of race, color, sex, religion, age, sexual orientation, gender identity and expression, national origin, marital status, physical or mental disability, status as a Disabled Veteran, Recently Separated Veteran, Active-Duty Wartime or Campaign Badge Veteran, Armed Forces Services Medal, or any other characteristic protected by law.
Job Requirementsback to top
Arcfield is a leading provider of full lifecycle, mission-focused systems engineering and integration capabilities to the U.S. government and its allies. The company has more than 60 years of proven experience providing advanced engineering and analysis, IT and C5ISR capabilities to support our nation’s most critical national security missions. Headquartered in Chantilly, VA and with 16 offices around the world, Arcfield employs approximately 1,200 engineers, analysts, IT specialists, and other professionals who put our customers’ missions first, helping them solve their most complex challenges through innovations in modeling, simulation and analysis, digital transformation and C5ISR. Visit arcfield.com for more details.
Job Detailsback to top
Location Vicenza, Veneto, Italy
Categories Security/Intel/Threat Analysis
Sec Clearances Top Secret/SCI
Location Mapback to top
Contact Informationback to top
Contact Name Frances Schuler
How to apply Employer provided a link where your application will be accepted. Click on the link below and follow instructions.
Apply
Job Code 2024-5148
Cyber Intelligence Analyst
Job tags
Salary