Senior Cyber Intelligence Analyst

Linthicum, MD, United States

Peraton

Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly...

View company page

Responsibilities

This Senior Analyst position supports the Department of Defense Cyber Crime Center (DC3) and participates as a team member serving as a Cyber Intelligence Analyst that applies intelligence analysis skills to monitor, assess, and report on cyberspace operations, capabilities, vulnerabilities, and personalities that could pose a threat to Department of Defense (DoD) critical assets, the DoD Information Network (DoDIN), Defense Industrial Base (DIB) networks and supports US Intelligence Community and Interagency grid network sensor portfolios. Conducts reviews, identifies gaps, recommends solutions, and evaluates large datasets from a myriad of sources. Develops reports and briefing artifacts; may serve as a mentor to other mid-level analysts and junior staff. Works as an expert in the field, researches and evaluates technical and all-source intelligence with specific emphasis on cryptocurrency transactions and counter-threat finance, network operations, and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and US and DoD information networks. Analyzes threat data from various sources and network events to determine the impact on current operations and conducts all-source research to determine advisory capability and intent. Prepares assessments and cyber threat profiles of current events based on the sophisticated collection, research, and analysis of classified and Open-Source information. Develops and maintains analytical procedures to meet changing requirements and ensure maximum operations. Collects data using a combination of standard intelligence methods and business processes. Produces high-quality papers, presentations, recommendations, and findings for senior US government intelligence and network operations officials.

Qualifications

  • Min 8 years with BS/BA, Min 6 years with MS/MA, Min 3 years with PhD
  • Active TS/SCI with CI Poly eligibility.
  • Requires experience providing integrated cyber, financial, virtual asset/virtual currency, and business analysis with advanced analytics and data science to support national security, criminal, cyber, and counterintelligence investigations and operations.
  • Must have experience with virtual currency transaction tracing utilizing blockchain analytical tools/explorers offered through, Chainalysis, TRM labs, and other digital asset analysis tool suite providers.
  • Possess expertise in using Intelligence Community databases, analytical tool suites, and commercial tool suite applications to analyze illicit financial flows and cryptocurrency exchanges. 
  • Experience gathering, analyzing, correlating, or evaluating information from various resources, such as law enforcement databases.
  • Experience with Law Enforcement/Counterintelligence (LE/CI) Operations and/or Cyberspace Operations.
  • Possess knowledge of network and application protocols, cyber vulnerabilities and exploitation techniques, and cyber threat/adversary methodologies (TTPs).
  • Possess familiarity with all-source analytical tools suites common to the Intelligence Community.
  • Possess working knowledge of blockchain analytical techniques.
  • Knowledge of building extended cyber security analytics.
  • Must have demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership.
  Preferred Qualifications:
  • Fluency in either Japanese or Chinese Mandarin (desired but not required).
  • Experience in intelligence-driven defense and/or Cyber–Kill Chain methodologies.
  • Possess current IAM Level II & III, CSSP Analyst (Security +, CySA+, GICSP, GSEC, CND, CISSP, CASP+, GCIA, GCIH, GCFA, CEH), GIAC Open Source Intelligence (GOSI) Certification, or SANS SEC487 Open-Source Intelligence (OSINT) Gathering and Analysis course.
  • Possess an understanding of Cloud Security Architecture and related aspects of cybersecurity operations/analysis (e.g., incident response & management, forensic media analysis, malware analysis/reverse-engineering, cyber threat intelligence analysis, etc.) and security architecture.

Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Target Salary Range

$112,000 - $179,000. This represents the typical salary range for this position based on experience and other factors.
Apply now Apply later
  • Share this job via
  • or

Tags: Analytics Blockchain CASP+ CEH CISSP Cloud CND Cyber crime DoD Finance GCFA GCIA GCIH GIAC GICSP GSEC IAM Incident response Industrial Malware Open Source OSINT PhD SANS Threat intelligence TS/SCI TTPs Vulnerabilities

Perks/benefits: Team events

Region: North America
Country: United States
Job stats:  8  1  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.