Target Development Analyst-
Salary: 120000 - 130000
Location: Chantilly, VA
Posted: October 28 2024
Minimum Degree:
Relocation Assistance: Not Available
Position Title: Target Development Analyst-
Position Type: Full-time (on-site)
Position Location: Chantilly, VA
Clearance Required: TS/SCI (eligible) w/ability to pass a Polygraph
Waypoint’s client is seeking Target Development Analyst- with Iran expertise or Cyber Counterterrorism to join their team supporting a Federal Law Enforcement program in Chantilly, VA
Required Knowledge:
A Bachelor’s degree in any major, a minimum of two years of intelligence analysis experience within the USIC, and one of the following certifications:
A Bachelor’s degree in computer science, engineering, mathematics, or information systems, and a minimum of two years of intelligence analysis work experience in the USIC.
OR
A minimum of three years of intelligence analysis work experience in the USIC, all of which supported offices whose primary focus was cyber threats to U.S. national security. (E.g., The Director of National Intelligence’s Cyber Threat Intelligence Integration Center (CTIIC); the Central Intelligence Agency’s Center for Cyber Intelligence (CCI); the National Cyber Investigative Joint Task Force (NCIJTF); etc.)
Position Type: Full-time (on-site)
Position Location: Chantilly, VA
Clearance Required: TS/SCI (eligible) w/ability to pass a Polygraph
Waypoint’s client is seeking Target Development Analyst- with Iran expertise or Cyber Counterterrorism to join their team supporting a Federal Law Enforcement program in Chantilly, VA
Required Knowledge:
- Knowledge of computer networking concepts and protocols, and network security methodologies.
- Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
- Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
- Knowledge of cybersecurity and privacy principles.
- Knowledge of cyber threats and vulnerabilities.
- Knowledge of intelligence production processes.
- Knowledge of internal and external partner intelligence processes and the development of information requirements and essential information.
- Knowledge of legal considerations in targeting.
- Knowledge of malware analysis and characteristics.
- Knowledge of operational effectiveness assessment.
- Knowledge of target estimated repair and recuperation times.
- Knowledge of target list development (i.e. Restricted, Joint, Candidate, etc.).
- Knowledge of target methods and procedures.
- Knowledge of TCP/IP networking protocols.
- Must possess a minimum of 2-3 years of intelligence analysis work experience in the USIC
- Assessing and/or estimating effects generated during and after cyber operations.
- Experience conducting non‐attributable research.
- Experience defining and characterizing all pertinent aspects of the operational environment.
- Experience developing or recommending analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
- Experience evaluating information for reliability, validity, and relevance.
- Experience identifying alternative analytical interpretations to minimize unanticipated outcomes.
- Experience identifying cyber threats which may jeopardize organization and/or partner interests.
- Experience preparing and presenting briefings.
- Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
- Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
- Ability to clearly articulate intelligence requirements into well‐formulated research questions and data tracking variables for inquiry tracking purposes.
- Ability to develop or recommend analytic approaches or solutions to problems and situations.
- Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.
- Experience in fusion analysis.
- Experience performing target system analysis.
- Experience reviewing and editing target materials.
- Ability to clearly articulate intelligence requirements into well‐formulated research questions and requests for information.
A Bachelor’s degree in any major, a minimum of two years of intelligence analysis experience within the USIC, and one of the following certifications:
- CompTIA Network+
-
CompTIA Security+
- EC Council Certified Ethical Hacker (CEH)
- EC Council Computer Hacking Forensics Investigator (CHFI)
- Logical Operations Inc. CyberSec First Responder (CFR)
- CompTIA Cybersecurity Analyst (CySA+)
- CompTIA Cloud Plus (Cloud+)
- CompTIA PenTest+
- GIAC Certified Intrusion Analyst (GCIA)
- GIAC Certified Incident Handler (GCIH)
- GIAC Global Industrial Cyber Security Professional (GICSP)
- Cisco Cybersecurity Specialty Certification (SCYBER)
A Bachelor’s degree in computer science, engineering, mathematics, or information systems, and a minimum of two years of intelligence analysis work experience in the USIC.
OR
A minimum of three years of intelligence analysis work experience in the USIC, all of which supported offices whose primary focus was cyber threats to U.S. national security. (E.g., The Director of National Intelligence’s Cyber Threat Intelligence Integration Center (CTIIC); the Central Intelligence Agency’s Center for Cyber Intelligence (CCI); the National Cyber Investigative Joint Task Force (NCIJTF); etc.)