Cyber Targeter

Booz Allen Hamilton Inc. Chantilly , VA 22022

Posted 3 days ago

Job Description: Job Number: R0037027

Cyber Targeter

Key Role:

Identify persons of interest and relevant TTPs and track strategic Cyber threats against US national security and criminal equities. Leverage expertise in technical and analytical work to support analysis, research, targeting, and operations in the intelligence community (IC) to develop a holistic view of assigned Cyber threat areas. Conduct in-depth research of potential Cyber threats, subjects, or sources, gather, interpret, and evaluate information from both classified and unclassified sources, and make recommendations. Fuse technical expertise with intelligence analysis to assist with the integration, coordination, and dissemination of relevant information to appropriate parties.

Basic Qualifications:

  • 3+ years of experience in a threat intelligence analysis role as a targeter, threat analyst, or intelligence analyst

  • Experience with federal law enforcement and the IC

  • Experience with conducting strategic and tactical intelligence analyses

  • Experience with identifying, enumerating, and targeting persons of interest regarding Cyber network exploitation, foreign intelligence, and counter threats

  • Experience with a foreign language, including Russian or Korean

  • Experience with identifying Cyber tactics, techniques, and procedures

  • Active TS/SCI clearance

  • BA or BS degree

Additional Qualifications:

  • Experience with source operations and collection

  • Experience with sociocultural and sociopolitical affairs pertaining to Asia, MENA, and Eurasia

  • Experience with leveraging Cyber technical expertise, including Netflow analysis, forensics, and malware

  • Experience with all-source analysis

  • BA or BS degree in Cyber, Law Enforcement, or an Intelligence-related field

Clearance:

Applicants selected will be subject to a security investigation and need to meet eligibility requirements for access to classified information; TS/SCI clearance is required.

We're an EOE that empowers our peopleno matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, or veteran statusto fearlessly drive change.

JHT


upload resume icon
See if you are a match!

See how well your resume matches up to this job - upload your resume now.

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Cyber Security Analyst
New!

Rct-Systems

Posted Today

VIEW JOBS 1/22/2019 12:00:00 AM 2019-04-22T00:00 RCT Systems is seeking a penetration tester who will successfully perform vulnerability assessments and penetration testing following the customer’s prescribed scope statement with authorities derived from the customer’s Enterprise cyber security organization. The ideal candidate must display familiarity with Windows and Linux Mobile operating systems and be able to conduct network and security vulnerability analysis. Specifically, the candidate will analyze mission systems to help assess vulnerability compromise from adversaries. The successful candidate must have prior experience with scope defined penetration testing using mainly open source tools. Conducts research and evaluates technical and all-source intelligence with specific emphasis on user behavior and patterns in a dynamic and changing mission environment.  Analyzes technical and non-technical data and metadata to determine normal patterns of events, proactively identify abnormalities, and determine root-cause of abnormalities. Correlates threat data from various sources. Prepares assessments and presentations of analyses and findings. Develops and maintains analytical procedures to meet changing requirements and ensure maximum operations. Collects data using a combination of standard intelligence methods and business processes. Produces high-quality papers, presentations, recommendations, and findings for senior officials.<br />  <br /> <strong>Required Qualifications: </strong> <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">BS (or equivalent) in Cybersecurity, Information Security, IT, EE, Network Engineering, Computer Science, or related field</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Six (6) year’s experience in three (3) or more specific areas to include: analysis, network engineering, networking security, penetration testing tool, red teaming, hardware engineering, software engineering, vulnerability assessment tools (OS, web, database) etc.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Familiarity of various operating systems: Windows, iOS, Android, or Linux</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Proficiency with at least three (3) or more of the following: mobile security, telecom protocols, operating systems, reverse engineering, forensics, network analysis, vulnerability assessment or malware.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Scripting or coding experience</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Working knowledge of software development</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Experience in network analysis methodologies</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Experience in drafting reports, documenting case details, and able to summarize findings and recommendations based on system analysis.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Demonstrated strong written and verbal communication skills</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Security Certification: CEH, GIAC or equivalent pen testing cert.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">TS/SCI with Poly</li> </ul> <strong>Desired Qualifications: </strong> <ul> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">MS degree in technical field</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Familiarity with Wireshark, Fiddler, EnCase, Sleuthkit and similar tools</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Experience employing advanced forensic tools and techniques for attack reconstruction, including dead system analysis and volatile data collection and analysis</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Desired security certification: examples include OSCP, CEH, CISSP, or Security+</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Law Enforcement/Cyber Forensics experience</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Experience in performing post-incident computer forensics without destruction of critical data.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Experience in Malware Analysis and Reverse Engineering.</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Experience with Splunk, ArcSight, HP Openview, FireEye, Solar Winds, Wed Sense</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Desired experience ensuring quality assurance and the spreading of best practices</li> <li style="padding: 0; margin: 0;" style="padding: 0; margin: 0;">Experience with operational communications</li> </ul>  <br /> <br />  <br /> <br /> <br /> RCT Systems is an Equal Employment Opportunity Employer.  Qualified applicants will receive consideration for employment without regards to race, color, religion, sex, sexual orientation, gender identity, national origin disability or protected veteran status.   <br />   Rct-Systems Chantilly VA

Cyber Targeter

Booz Allen Hamilton Inc.