Intelligence Analyst with Security Clearance - Fort Meade, MD, United States - Strategic Resilience Group

    Strategic Resilience Group
    Strategic Resilience Group Fort Meade, MD, United States

    1 week ago

    Default job background
    Technology / Internet
    Description
    SRG is seeking an experienced Intelligence Analyst to join our team of Cyber Operation Analysts and Subject Matter Experts (SMEs) to support planning, coordination, synchronization, and execution of offensive cyberspace operations in support of aligned combatant command and designated sub-unified commands
    This includes a deep understanding and experience in the employment of available cyberspace capabilities as well as the creation of future cyberspace capabilities
    Tasking will include comprehensive cyber support for cyberspace operations planning and intelligence analysis at Joint Force Headquarters level.

    Roles and Responsibilities:

    The Intelligence Analyst will perform the following functions:

    • Support the intelligence collection process and inter-office communications between the United States Intelligence Community, organic collections teams and multiple supported military headquarters Intelligence centers at the TS/SCI level.
    • Contribute to the creation of intelligence collections strategy, develop intelligence indicators and submit collection requirements to theater and national intelligence activity and support the triage and dissemination of information to the appropriate consumer.
    • Advise the Intelligence Officer and Operations Officer and other groups in the planning, coordinating and submission of intelligence requirements across a variety of interests
    Required Qualifications: 1

    TS/SCI with counterintelligence (CI) polygraph.
    2
    Individual should meet DODM IAT Level II position requirements.
    3
    Associate degree or higher in Computer Science, Cyber Security, Information Technology, Software
    Engineering, Information Systems, or Computer Engineering from an accredited college or university and 2
    years of experience in the field and CASP+, CCSP, Cloud+, or CLSSP certifications
    OR - 4 years of experience as a Threat Analyst with experience in either Host analysis or Network analysis managing SIEM or SOAR platforms such as Elastic, Splunk, Sentinel or other open-source or government provided solutions
    OR - 4 years of experience in Offensive Cyber Operations as an Exploitation Analyst
    OR - 4 years of experience in the SIGINT community as a Target Digital Network Analyst or Digital Network
    Exploitation Analyst.
    4
    Demonstrated experience in at least three of the following: - Correlation of data from multiple sources, including host, network, user, and intelligence reports to
    uncover threats

    • Collection, aggregation, and interpretation of log data from various sources
    • Configuration, management, and optimization of Network Intrusion Detection Systems and Hostbased
    Intrusion Detection Systems to include fine-tuning security rule sets for tools such as Suricata, Snort,
    Yara, and Sigma

    • Deep packet inspection and identification of malicious traffic using packet analysis tools, such as
    Wireshark or Network Miner

    • Threat hunting to identify advanced persistent threats and zeroday vulnerabilities using various threat
    hunting methodologies.