Analyze the origins, pathways, methodologies of malicious cyber activities to attribute, model, and predict future intrusions.
Analyze cyber trends and statistics to provide proactive indications and warnings of malicious cyber activity throughout USACE and its extended networks that are affecting or may affect Army networks in the future.
Perform queries of network data and analyze results for anomalies and malicious indicators.
Proven experience and ability to leverage CND analyst toolsets to detect and respond to IT security incidents.
Assists with devising models and measuring techniques; utilizes mathematics, statistical methods, engineering methods, operational mathematics techniques (linear programming, game theory, probability theory, symbolic language, etc.), and other principles and laws of scientific and economic disciplines.
Ability to demonstrate an understanding and ability to apply technical principles, theories, and concepts within the Cyber Research field and assists in providing consultation to technical solutions over a wide range of complex difficult problems in which proposed solutions are imaginative, thorough, practicable, and consistent with organization objectives.
Provide ongoing technical analysis of computer network traffic, intrusion events and malicious activity in support of cyber intelligence efforts.
Research, evaluate, analyze, integrate and interpret information from multiple intelligence and operational sources and fuse into finished intelligence products. Synchronize and integrate intelligence activities in order to detect, analyze and recommend mitigation of cyberthreats and vulnerabilities.
Maintain continuity of cyberthreat individuals, cyber-personas and organizations to support attribution and predict adversary COA.
Produce social network analysis of threat entities to facilitate order of battle and template creation, and conduct human factor and organizational analysis on cyberthreat entities.
Analyze trends and statistics of cyberthreat organizations/personnel to provide indications and warnings of malicious cyber activity throughout Army networks and the Department of Defense Information Network.
Perform routine eventreporting over time including trend reporting and analysis.
5-8 years of experience in Information Assurance and Cyber Intelligence.
Working knowledge of the National, Tactical, Strategic, and Joint Intelligence Community Collection Management system and its capabilities and limitations.
Proficiency with Threat deep-dive, networkforensics, malware reverse engineering, Intel fusion; FireEye, Riverbed, StealthWatch, Inquest, ArcSight, and Palo Alto.
Skill to identify problems, draw valid conclusions, and develop effective solutions to troubleshoot and resolve application performance issues.
Skill to establish and maintain cooperative working relationships with others in the course of work in order to participate on projects.
Skill to organize and perform a conversion between generations or versions of computer systems in order to ensure accurate implementation, add functionality, fix existing problems, and meet business requirements.
Professionally certified as Technical Level II as defined by DODI 8570 is a requirement.