Are you interested in using your skills to help shape the Cyber, Security, & Intel space? If so, look no further. We are seeking an Analyst to join our team of passionate individuals. In this role you will support challenging, mission-critical projects that make a direct impact on the nation’s security and intelligence mission.
This program supports Intelligence Analysis and Scientific Analysis activities in support of Marine Corps Intelligence Activity (MCIA), Intelligence (S2), Operations (S3) and Counterintelligence & Human Intelligence (CI/HUMINT) Directorates. Collaborates with the United States Marine Corps (USMC) and Department of Defense’s (DoD) best trained General Military Intelligence (GMI) professionals. Will be required to provide stakeholders Intelligence Analytical support for all Intelligence factions. Provides necessary resources with knowledge and experience to support Weapons and Technical Analysis, Geo-spatial Intelligence Science and Analysis, Regional Analysis, Intelligence, Surveillance, and Reconnaissance, and Counterintelligence (CI)/Human Intelligence (HUMINT).
Responsibilities\:
Assess the cybersecurity posture of a USMC defense program, ensuring the program is evolving with the best cybersecurity practices, prioritizing cyber threats based on factual cyber analysis. Analyze foreign capabilities to detect, disrupt, and deny USMC emissions and signals throughout the cyber kill chain, to include, but not limited to emissions from targeting, communications, and intelligence, surveillance, and reconnaissance (ISR) assets, reversible and non-reversible attacks. Identify, monitor, and assess advancements in emerging and commercial technologies that could be employed by state and non-state actors to detect, disrupt, and deny USMC acquisition programs’ network infrastructure. Identify significant risk characteristics of the environment such as classification of network, baseline activity, architecture, operating system, services, connectivity and bandwidth. Identify the limits of the network to be collected against. Establish limits of the supporting or connected networks that may need to be collected against. Evaluate existing databases and identify intelligence gaps. Use open source to gather Publicly Available Information (PAI). Explore the physical battlespace; how could the environment affect tactical operations. Define the battlespace effects. Analyze the battlespace environment for information, services and networks, such as confidentiality, integrity, availability; and protect, detect, respond, restore and conduct reviews. Analyze other characteristics of the battlespace such as security, auditing procedures, and backup systems. Evaluate the adversary on physical location of all assets, architecture and automation skills, security and policies, baseline activity, peculiarities and vulnerabilities, capabilities, and conclusions that address\: Rules of Engagement (ROE) for Information Assurance (IA), Computer Network Defense (CND) and Computer Network Attack (CNA) Determine adversary’s Courses of Action (COA). Identify the adversary’s likely objectives and desired end state. Identify the full set of COA’s available to the adversary, at a minimum the most likely and most dangerous should be developed. Develop COA’s based on enemy perception of friendly information architecture (reverse cyber IPB). Evaluate and prioritize each adversary COA. Continue to refine COA’s as time and new information allow. Evaluate foreign Computer Network Defense (CND) and Computer Network Attack (CNA) capabilities, limitations, and vulnerabilities. Assess potential vulnerabilities of USMC tactical systems to CNA to include systems related to targeting, ISR, and navigation assets. Conduct all-source analysis to evaluate foreign military systems and technologies. Conduct research, create intelligence products, create intelligence estimate assessments, and conduct intelligence briefings on request based on MCIA’s Program of Analysis (POA) and customer-driven requests for information (RFIs). Collect, analyze, interpret, evaluate and research using tools, techniques, methodology and software. Produce and deliver written intelligence assessments and briefings to support consumers at the tactical, operational, and strategic level as assigned. Written products will meet Intelligence Community Standards (e.g., ICD 203, 206, 208) and MCIA standards and adhere to MCIA production and review processes. Maintain situational awareness of and analyze the assigned portfolio. Conduct research to determine current and future foreign capabilities. Follow technology transfer and its military impact and ability of recipient countries to assimilate transferred technology. Annually publish/produce at least the minimum number of all-source analysis products (e.g., written and oral reports) as dictated by the production requirements on assigned account. Collect, analyze, interpret, evaluate, and integrate complex data from multiple sources to assess the relevance and significance of developments in his/her assigned subject matter and geographic area(s). Identify and assess intelligence gaps, recommend, and submit collection requirements to fill gaps. Develops collection strategies and composes collection requirements. Correlate technically derived data using multiple intelligence disciplines and open-source information. Attend, participate in, and contribute to relevant conferences and other events. Maintain contact and collaborate with counterparts across MCIA and in other intelligence organizations to keep abreast of current developments, to resolve problems to eliminate duplication, and to provide free flow of information on matters of intelligence interest. Deliver subject matter expertise to support the development of new processes, procedures, and technologies. Conduct peer reviews and reviews of intelligence products submitted for internal coordination and external intelligence community coordination. Provide portfolio specific analysis, expertise, and intelligence production as specified below. Conduct Threat Steering Groups with members across USMC Combat Development & Integration to identify key factors and significant risk drivers for potential materiel solutions that may inform lifecycle cost, performance, schedule, and other acquisition decision making. Produce and deliver Validated Online Lifecycle Threat Reports (VOLTs), Critical Intelligence Parameters (CIPs), and Capability Development Threat Summaries to support Marine Corps Acquisition Programs across the Joint Capabilities Integration and Development System (JCIDS) process, to support the Defense Acquisition System.#divergent
*Are you interested in using your skills to help shape the Cyber, Security, & Intel space? If so, look no further. We are seeking an Analyst to join our team of passionate individuals. In this role you will support challenging, mission-critical projects that make a direct impact on the nation’s security and intelligence mission.
This program supports Intelligence Analysis and Scientific Analysis activities in support of Marine Corps Intelligence Activity (MCIA), Intelligence (S2), Operations (S3) and Counterintelligence & Human Intelligence (CI/HUMINT) Directorates. Collaborates with the United States Marine Corps (USMC) and Department of Defense’s (DoD) best trained General Military Intelligence (GMI) professionals. Will be required to provide stakeholders Intelligence Analytical support for all Intelligence factions. Provides necessary resources with knowledge and experience to support Weapons and Technical Analysis, Geo-spatial Intelligence Science and Analysis, Regional Analysis, Intelligence, Surveillance, and Reconnaissance, and Counterintelligence (CI)/Human Intelligence (HUMINT).
Responsibilities\:
Assess the cybersecurity posture of a USMC defense program, ensuring the program is evolving with the best cybersecurity practices, prioritizing cyber threats based on factual cyber analysis. Analyze foreign capabilities to detect, disrupt, and deny USMC emissions and signals throughout the cyber kill chain, to include, but not limited to emissions from targeting, communications, and intelligence, surveillance, and reconnaissance (ISR) assets, reversible and non-reversible attacks. Identify, monitor, and assess advancements in emerging and commercial technologies that could be employed by state and non-state actors to detect, disrupt, and deny USMC acquisition programs’ network infrastructure. Identify significant risk characteristics of the environment such as classification of network, baseline activity, architecture, operating system, services, connectivity and bandwidth. Identify the limits of the network to be collected against. Establish limits of the supporting or connected networks that may need to be collected against. Evaluate existing databases and identify intelligence gaps. Use open source to gather Publicly Available Information (PAI). Explore the physical battlespace; how could the environment affect tactical operations. Define the battlespace effects. Analyze the battlespace environment for information, services and networks, such as confidentiality, integrity, availability; and protect, detect, respond, restore and conduct reviews. Analyze other characteristics of the battlespace such as security, auditing procedures, and backup systems. Evaluate the adversary on physical location of all assets, architecture and automation skills, security and policies, baseline activity, peculiarities and vulnerabilities, capabilities, and conclusions that address\: Rules of Engagement (ROE) for Information Assurance (IA), Computer Network Defense (CND) and Computer Network Attack (CNA) Determine adversary’s Courses of Action (COA). Identify the adversary’s likely objectives and desired end state. Identify the full set of COA’s available to the adversary, at a minimum the most likely and most dangerous should be developed. Develop COA’s based on enemy perception of friendly information architecture (reverse cyber IPB). Evaluate and prioritize each adversary COA. Continue to refine COA’s as time and new information allow. Evaluate foreign Computer Network Defense (CND) and Computer Network Attack (CNA) capabilities, limitations, and vulnerabilities. Assess potential vulnerabilities of USMC tactical systems to CNA to include systems related to targeting, ISR, and navigation assets. Conduct all-source analysis to evaluate foreign military systems and technologies. Conduct research, create intelligence products, create intelligence estimate assessments, and conduct intelligence briefings on request based on MCIA’s Program of Analysis (POA) and customer-driven requests for information (RFIs). Collect, analyze, interpret, evaluate and research using tools, techniques, methodology and software. Produce and deliver written intelligence assessments and briefings to support consumers at the tactical, operational, and strategic level as assigned. Written products will meet Intelligence Community Standards (e.g., ICD 203, 206, 208) and MCIA standards and adhere to MCIA production and review processes. Maintain situational awareness of and analyze the assigned portfolio. Conduct research to determine current and future foreign capabilities. Follow technology transfer and its military impact and ability of recipient countries to assimilate transferred technology. Annually publish/produce at least the minimum number of all-source analysis products (e.g., written and oral reports) as dictated by the production requirements on assigned account. Collect, analyze, interpret, evaluate, and integrate complex data from multiple sources to assess the relevance and significance of developments in his/her assigned subject matter and geographic area(s). Identify and assess intelligence gaps, recommend, and submit collection requirements to fill gaps. Develops collection strategies and composes collection requirements. Correlate technically derived data using multiple intelligence disciplines and open-source information. Attend, participate in, and contribute to relevant conferences and other events. Maintain contact and collaborate with counterparts across MCIA and in other intelligence organizations to keep abreast of current developments, to resolve problems to eliminate duplication, and to provide free flow of information on matters of intelligence interest. Deliver subject matter expertise to support the development of new processes, procedures, and technologies. Conduct peer reviews and reviews of intelligence products submitted for internal coordination and external intelligence community coordination. Provide portfolio specific analysis, expertise, and intelligence production as specified below. Conduct Threat Steering Groups with members across USMC Combat Development & Integration to identify key factors and significant risk drivers for potential materiel solutions that may inform lifecycle cost, performance, schedule, and other acquisition decision making. Produce and deliver Validated Online Lifecycle Threat Reports (VOLTs), Critical Intelligence Parameters (CIPs), and Capability Development Threat Summaries to support Marine Corps Acquisition Programs across the Joint Capabilities Integration and Development System (JCIDS) process, to support the Defense Acquisition System.#divergent
* Demonstrates working knowledge of the concepts involved in the specific functions outlined in the specified labor category description. Knowledgeable of and demonstrates ability to apply IC and DoD classification guidelines and procedures. Demonstrates ability to work semi-independently with oversight and direction. Demonstrates ability to use logic when evaluating and synthesizing multiple sources of information. Demonstrates understanding of interpreting analysis to include, but not limited to, its meaning, importance, and implications. Demonstrates ability to defend analytic judgements with sound, logical conclusions and adapt analytic judgments when presented with new information, evolving conditions, or unexpected developments. Demonstrates ability to produce timely, logical, and concise analytic reports, documents, assessments, studies, and briefing materials in formats including Microsoft Office tools (e.g. Excel, Word, PowerPoint, etc.), electronic / soft copy matrices and / or web-enabled formats. Demonstrates ability to communicate complex issues clearly in a concise and organized manner both verbally and non-verbally; with strong grammar skills. Demonstrates proficiency using Microsoft Office tools. Demonstrates ability to develop structured research including, but not limited to, obtaining, evaluating, organizing, and maintaining information within security and data protocols. Demonstrates ability to recognize nuances and resolve contradictions and inconsistencies in information. Demonstrates working knowledge using complex analytic methodologies, such asstructured analytic techniques or alternative approaches, to examine biases, assumptions, and theories to eliminate uncertainty, strengthen analytic arguments, and mitigate surprise. Structured analytic techniques include, but not limited to, Analysis of Competing Hypotheses, Devil’s Advocacy, High-Impact / Low-Impact Analysis, Red Team Analysis and Alternative Futures Analysis. Demonstrates understanding of intelligence collection capabilities and limitations, toinclude but not limited to, technical sensors / platforms and human intelligence sources related to the labor category. Demonstrates understanding of evaluating collected intelligence reporting, engaging with collection managers, and developing collection requirements.
Clearance Required\:
Active TS/SCIPreferred\:
Minimum 3 years of experience conducting analysis relevant to the specific labor category, with at least a portion of the experience within the last 2 years. Bachelor’s degree in an area related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education. An additional 4 years of experience in the specific labor category, for a total of 7 years of experience in the specific labor category, may be substituted for a Bachelor’s degree. * Demonstrates working knowledge of the concepts involved in the specific functions outlined in the specified labor category description. Knowledgeable of and demonstrates ability to apply IC and DoD classification guidelines and procedures. Demonstrates ability to work semi-independently with oversight and direction. Demonstrates ability to use logic when evaluating and synthesizing multiple sources of information. Demonstrates understanding of interpreting analysis to include, but not limited to, its meaning, importance, and implications. Demonstrates ability to defend analytic judgements with sound, logical conclusions and adapt analytic judgments when presented with new information, evolving conditions, or unexpected developments. Demonstrates ability to produce timely, logical, and concise analytic reports, documents, assessments, studies, and briefing materials in formats including Microsoft Office tools (e.g. Excel, Word, PowerPoint, etc.), electronic / soft copy matrices and / or web-enabled formats. Demonstrates ability to communicate complex issues clearly in a concise and organized manner both verbally and non-verbally; with strong grammar skills. Demonstrates proficiency using Microsoft Office tools. Demonstrates ability to develop structured research including, but not limited to, obtaining, evaluating, organizing, and maintaining information within security and data protocols. Demonstrates ability to recognize nuances and resolve contradictions and inconsistencies in information. Demonstrates working knowledge using complex analytic methodologies, such asstructured analytic techniques or alternative approaches, to examine biases, assumptions, and theories to eliminate uncertainty, strengthen analytic arguments, and mitigate surprise. Structured analytic techniques include, but not limited to, Analysis of Competing Hypotheses, Devil’s Advocacy, High-Impact / Low-Impact Analysis, Red Team Analysis and Alternative Futures Analysis. Demonstrates understanding of intelligence collection capabilities and limitations, toinclude but not limited to, technical sensors / platforms and human intelligence sources related to the labor category. Demonstrates understanding of evaluating collected intelligence reporting, engaging with collection managers, and developing collection requirements.
Clearance Required\:
Active TS/SCIPreferred\:
Minimum 3 years of experience conducting analysis relevant to the specific labor category, with at least a portion of the experience within the last 2 years. Bachelor’s degree in an area related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education. An additional 4 years of experience in the specific labor category, for a total of 7 years of experience in the specific labor category, may be substituted for a Bachelor’s degree. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.