Senior Cyber Intelligence Analyst

Linthicum, MD, United States

Peraton

Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly...

View all jobs at Peraton

Responsibilities

This Senior Cyber Intelligence Analyst position supports the Department of Defense Cyber Crime Center (DC3) and offers a unique opportunity for growth and mentorship. As a Senior Cyber Intelligence Analyst, you will apply your intelligence analysis skills to monitor, assess, and report on cyberspace operations, capabilities, vulnerabilities, and personalities that could pose a threat to Department of Defense (DoD) critical assets, the DoD Information Network (DoDIN), Defense Industrial Base (DIB) networks, and the US Intelligence Community and Interagency grid network sensor portfolios. In addition to your core responsibilities, you will have the chance to conduct reviews, identify gaps, recommend solutions, and evaluate large datasets from a myriad of sources. You will also develop reports and briefing artifacts and may serve as a mentor to other mid-level analysts and junior staff, fostering a culture of learning and development. 

 

As a Senior Cyber Intelligence Analyst, you will be a recognized expert in the field, researching and evaluating technical and all-source intelligence with specific emphasis on cryptocurrency transactions and counter-threat finance, network operations, and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and US and DoD information networks. Your analyses of threat data from various sources and network events will directly impact current operations, and your all-source research will determine advisory capability and intent. You will prepare assessments and cyber threat profiles of current events based on the sophisticated collection, research, and analysis of classified and Open-Source information. Your role will also involve developing and maintaining analytical procedures to meet changing requirements and ensure maximum operations, underlining the urgency and significance of your work.

Qualifications

  • Minimum 8 years with BS/BA, 6 years with MS/MA, 3 years with PhD.
  • Active TS/SCI with CI Poly eligibility.
  • Requires experience providing integrated cyber, financial, virtual asset/virtual currency, and business analysis with advanced analytics and data science to support national security, criminal, cyber, and counterintelligence investigations and operations.
  • Must have experience with virtual currency transaction tracing utilizing blockchain analytical tools/explorers offered through Chainalysis, TRM labs, and other digital asset analysis tool suite providers.
  • Possess expertise in using Intelligence Community databases, analytical tool suites, and commercial tool suite applications to analyze illicit financial flows and cryptocurrency exchanges. 
  • Experience gathering, analyzing, correlating, or evaluating information from various resources, such as law enforcement databases.
  • Experience with Law Enforcement/Counterintelligence (LE/CI) Operations and/or Cyberspace Operations.
  • Possess knowledge of network and application protocols, cyber vulnerabilities and exploitation techniques, and cyber threat/adversary methodologies (TTPs).
  • Possess familiarity with all-source analytical tools suites common to the Intelligence Community.
  • Possess working knowledge of blockchain analytical techniques.
  • Knowledge of building extended cyber security analytics.
  • Must have demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership.
  Preferred Qualifications:
  • Fluency in either Chinese Mandarin, Korean, or Japanese (desired but not required).
  • Experience in intelligence-driven defense and/or Cyber–Kill Chain methodologies.
  • Possess current IAM Level II & III, CSSP Analyst (Security +, CySA+, GICSP, GSEC, CND, CISSP, CASP+, GCIA, GCIH, GCFA, CEH), GIAC Open Source Intelligence (GOSI) Certification, or SANS SEC487 Open-Source Intelligence (OSINT) Gathering and Analysis course.
  • Possess an understanding of Cloud Security Architecture and related aspects of cybersecurity operations/analysis (e.g., incident response & management, forensic media analysis, malware analysis/reverse-engineering, cyber threat intelligence analysis, etc.) and security architecture.

Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Target Salary Range

$135,000 - $216,000. This represents the typical salary range for this position based on experience and other factors.
Job stats:  1  0  0
Category: Analyst Jobs

Tags: Analytics Blockchain CASP+ CEH CISSP Cloud CND Cyber crime DoD Finance GCFA GCIA GCIH GIAC GICSP GSEC IAM Incident response Industrial Malware NetOps Open Source OSINT PhD SANS Threat intelligence TS/SCI TTPs Vulnerabilities

Perks/benefits: Career development Team events

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.