The Target Digital Network Analyst conducts advanced analysis of collection and open-source data to ensure target continuity, to profile targets and their activities, and develop techniques to gain ore target information.
In this role, you will serve as the network operations task lead in support of the Headquarters Department of the Army (HQDA). Provide onsite leadership through direct interaction with senior Army stakeholders, including GO and SES, government task leads, and project team members.
The Target Digital Network Analyst has an understanding the principles and methods of exploiting foreign communications and communication systems to identify, collect, analyze process and disseminate information in accordance with established requirements and priorities.
In this role, you will provide/author documentation, lead and participate in design, code, and software readiness reviews as prescribed by the Governments software development procedures and processes.
In this role, you will be installing, implementing, administering, monitoring, and maintaining all security architecture technology solutions including vulnerability management tools, Intrusion detection, and external scanning.
In this role, the selected candidate will have audit functions, including reviewing UNIX and Windows system logs, network monitoring, such as analyzing network traffic for anomalies, inspecting Web application logs, and correlating events across various logging mechanisms.
In this role, you will be responsible for
develop a thorough understanding of the FTTP discipline. Master the technology and understand all metrics available to analyze anomalies, trends, and understand the drivers of volume spikes/declines.
In this role, the selected candidate will conduct intelligence research and network analysis of data in order to provide finished intelligence products, briefings, and assessments on threat financiers, facilitators, and financial operations and networks.
In this role, the selected candidate must have an experience with Army Cybersecurity strategy, policy, and programs as a program manager, systems engineer, or analyst; experience with managing large teams across geographic locations.
In this role, the selected candidate must be able to perform technical metadata and content analysis of threat adversary automated information systems; capable of leveraging their linguist skills to characterize, analyze and reconstruct threat digital networks.
In this role, you will conduct intelligence research and network analysis of data in order to provide finished intelligence products, briefings, and assessments on threat financiers, facilitators, and financial operations and networks.