Search Jobs

Hold CTRL to choose multiple sectors (up to 3)


Hold CTRL to choose multiple sectors (up to 3)

Cyber Intelligence Analyst job in Suffolk

Engineering Jobs with General Dynamics US
  • Show me jobs like this one
  • More jobs from this recruiter
  • Email this job to a friend
  • Print this job
Job Ref:  95589841
Employer:  General Dynamics US
Country:  United States
County/State:  Virginia
City:  Suffolk
13/10/2016 05:07
ID 2016-21326
Job Location USA - VA-Suffolk

Required Clearance TS/SCI
Posted Date 10/10/2016 9:57:00 AM
Category Cyber

Responsibilities for this Position:

General Dynamics Mission Systems (GDMS), a market leader and technology innovator, is seeking talented professionals to deliver cutting edge solutions to our customers.

General Dynamics Mission Systems has an immediate opening for a Cyber Intelligence Analyst to join our team. The position provides an opportunity to develop the cutting-edge technology that supports some of our nation's fundamental defense services. General Dynamics Mission Systems employees work closely with esteemed clients to develop solutions that allow them to carry out high-stakes national security missions.

The selected candidate will work with collaborative teams to analyze information and intelligence relevant to threats facing the systems, infrastructure, and resources critical to the nation. In addition to receiving a competitive salary and generous health and personal benefits, the Cyber Intelligence Analyst will enhance their skill set by working among a talented and technically accomplished group of colleagues. The employee will also enjoy a flexible work environment where contributions are recognized and rewarded.

  • Strong technical skills proficiency in the following areas: network communication using TCP/IP protocols, basic system administration, basic understanding of malware (malware communication, installation, malware types), intermediate knowledge of computer network defense operations (proxy, firewall, IDS/IPS, router/switch) and open source information collection.
  • Candidate must have a thorough understanding of Domain Name Service records.
  • Strong knowledge of Cyber Threat Intelligence principles to include indicators of compromise (IOC) types, indicator pivoting and indicator attribution strength.
  • Strong understanding of US Intelligence Community and how cyber intelligence organizations work together for purposes of conducting cyber threat analysis
  • Strong proficiency and recent experience (within last 3 years) performing NETFLOW and PCAP analysis using common analysis tools (examples include Wireshark, Splunk, ChopShop, Dshell, Network Miner, Moloch, etc)
  • Candidate must be strongly proficient at sessionizing PCAP data, identifying and decoding protocols, extracting files, and applying standard filters such as Berkley Packet Filter (BPF).
  • Strong proficiency Report writing - a technical writing sample and technical editing test will be required if the candidate has no prior published intelligence analysis reporting
  • Strong or Intermediate ability to apply formal intelligence analysis methods, develop hypothesis, prove/disprove relationships, always ask why, defend your analysis, and apply attribution to cyber threat activity
  • Candidate must be able to make confidence-based assessments for purposes of attribution based on their technical analysis of network traffic, multi-source data, malware and system forensic analysis
  • Candidate must be able to identify analytic bias
  • Intermediate ability to build intrusion related data visualizations and perform analysis (i.e., using I2 Analyst Notebook, Netviz, Palantir, etc)
  • Intermediate ability to present technical information and analysis to groups up to 50 persons on a quarterly basis
  • Candidate will be required to brief smaller groups up to 10 persons on a weekly basis.
  • Self-starter with the ability to proactively engage and develop relationships with intrusion set subject matter experts and analyst counterparts across the US Intelligence and Law Enforcement communities

Basic Qualifications:

  • 3+ years performing technical cyber threat intelligence analysis

Candidates must show a sophisticated understanding of statistical analysis and complex intelligence policies and procedures, and must demonstrate the capacity to successfully support General Dynamics Mission Systems intelligence operations.

The Cyber Intelligence Analyst position requires a Bachelor's degree in Information Technology or Information Security, Computer Science, Intelligence Studies, Cyber Security, or a related specialized area or the equivalent, and five to eight years of related experience; or a Master's degree and three to five years of related experience.

Department of Defense TS/SCI security clearance is required at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required.

Company Overview:

General Dynamics Mission Systems (GDMS) engineers a diverse portfolio of high technology solutions, products and services that enable customers to successfully execute missions across all domains of operation. With a global team of 13,000 top professionals, we partner with the best in industry to expand the bounds of innovation in the defense and scientific arenas. Given the nature of our work and who we are, we value trust, honesty, alignment and transparency. We offer highly competitive benefits and pride ourselves in being a great place to work with a shared sense of purpose. If who we are and what we do resonates with you, we invite you to join our high performance team!

General Dynamics is an Equal Opportunity/Affirmative Action Employer that is committed to hiring a diverse and talented workforce. EOE/Disability/Veteran.
Copyright © Rengineeringjobs.com Job Board 2011  | Powered by JobMount Job Board Software