Intelligence Sector is seeking a detail-oriented Threat Financial Analyst - Senior, to support the USCYBERCOM J2 mission... from a variety of formal banking systems, financial reports, and other relevant sources. The analyst will evaluate specific foreign...
Intelligence Sector is seeking a detail-oriented Intelligence Management Specialist (Oversight and Policy Analyst) - Senior..., Processing and Exploitation, Production, Dissemination and Integration, and Evaluation) and the principles, concepts...
Intelligence Sector is seeking a highly capable Socio-Cultural Analyst (CI/HUMINT Language Analyst - Russian) - Senior, to support... meaning and intent. This role also involves devising and recommending new methods for target language research, exploitation...
The Leidos Digital Modernization Sector has an opening for a Cyber Security Fusion Analyst on the DISA GSM-O II program..., cyber vulnerabilities and exploitation techniques and cyber threat/adversary methodologies. Proficiency with datasets...
Job Title CNO Analyst Overview EverWatch is a government solutions company providing advanced defense..., or international law. Responsibilities As a computer network operations (CNO) Analyst, you know that embedded/application...
Job Title: CNO Analyst Overview: EverWatch is a government solutions company providing advanced defense, intelligence..., or international law. Responsibilities: As a computer network operations (CNO) Analyst, you know that embedded/application developers...
. Responsibilities: The Computer Network Defense Analyst will: Thoroughly understand all aspects of computer and network security... cyber activity Ability to respond to unknown, suspicious, or exploitation activity Ability to provide formal briefings...
knowledge of network and application protocols, cyber vulnerabilities and exploitation techniques and cyber threat/adversary...
, Forensic, Signals, Exploitation etc) Vulnerability Analysts Data Analysts Penetration Testers Malware Analysts...
) IAT Level II or III Certification (Security+ CE most common, others accepted) Hands-on Cyber Security Analyst experience... & application protocols Cyber vulnerabilities & exploitation techniques Threat actor methodologies For immediate consideration...
for possible exploitation by Army CI. · During the course of their analysis, the contractor’s analysts shall identify intelligence gaps... Training Academy, or predecessor. · Experience: Minimum 12 years of experience as an All-Source Analyst · Minimum 5 years...