Support PDF,DOC,DOCX,TXT,XLS,WPD,HTM,HTML fils up to 5MB
Years of Experience
Date Last Verified
ProfileSenior Analyst The candidate must have bachelor's degree in a related specialized area or field or the equivalent is required plus 5+ years of relevant experience; or Master's degree plus 3+ years of relevant experience. Must have BA/BS degree in Information Technology or Information Security, Computer Science, Intelligence analysis, Cyber Security or another related field of study or equivalent 3+ years performing cyber threat intelligence analysis. Must have a strong all-source intelligence or counterintelligence background with 5+ years of experience serving in an analyst or agent role. Pertinent skills or experience include persona development, HUMINT targeting, support to law enforcement or counterintelligence investigations, Open Source Intelligence (OSINT) collection, Social Media/Social Networking analysis. Should have a high proficiency with the Mandarin language. Must have knowledge of cyber terminology, tools, and concepts. Must have 2+ years of experience writing intelligence analysis products within the last 5 years. Should have basic to intermediate technical skills proficiency in the following areas: network communication using TCP/IP protocols, basic system administration, basic understanding of malware (malware communication, installation, malware types), intermediate knowledge of computer network defense operations (proxy, firewall, IDS/IPS, router/switch, open source information collection. Should have the ability to build intrusion related data visualizations and perform analysis (i.e., using I2 Analyst Notebook, Netviz, Palantir, etc). Must have strong understanding of US Intelligence Community and how cyber intelligence organizations work together. Desired Skills: Experience building persona development products within the LE/CI or Intelligence Community; Expertise in assessing sources using the PAMSSA method; Formal training as an intelligence analyst in any discipline – graduate of USG intelligence analysis course: CAC, IBC, Kent School, IC 101, Analysis 101, Army, Navy, Air Force, etc.; Formal Law Enforcement/Counterintelligence training: i.e., FLETC, JCITA, etc.; Experience applying Kill Chain analysis, Cyber Intelligence Preparation of the Environment (CIPE) modeling, or Diamond modeling of cyber threat activity; Certifications (any): CISSP, CEH, Security+, SANS certification(s), Network+, CCNA; Advanced NETFLOW and PCAP Analysis; Advanced Data Visualization proficiency leveraging COTS/GOTS tools; Technical Skills proficiency: encryption technologies/standards; Intermediate malware analysis or digital computer forensics experience; Any type of Cyber related Law Enforcement or Counterintelligence experience; Existing Subject Matter Expert of Advanced Persistent Threat activity; Experience using GOTS, COTS/Open Source tools: i.e., NOEISIS, Novetta Cyber Analytics, Mitre ChopShop and/or ARL DSHELL; Analyst experience in Federal Cyber Center or Corporate CIRT.
General Dynamics Mission Systems
1190 Winterson Rd 300
Linthicum, MD 21090