Abacus Technology is seeking an Intelligence Analyst to support information assurance and threat intelligence activities for the Air Force Intranet Control (AFINC) III Support program at Maxwell AFB/Gunter Annex. This is a full-time position.
Responsibilities Provide intelligence services by discovering, assessing, explaining, anticipating, analyzing, and delivering information and products that provide mission assurance.Facilitate Requests for Information (RFI) and Production Requirements (PR) processes for the 26 NOS.Coordinate with Cyberspace operators to produce questions and provide operational details for tactical cyberspace responses.Participate in Tactics Review Board (TRB) meetings, answering questions, providing information, seeking clarification, and gathering information for the government.Provide data usable for course of action (COA) development and analysis, mission analysis during tactical mission planning, readiness training, and force protection tasks.Liaise with Training to provide mission qualification training on intelligence support, processes, and integration into the 26 NOS mission and maintain training modules for mission qualification and specialized training.Prepare cyberspace threat data for analysis and provide a threat intelligence report to 26 NOS leadership and AFINC operators.Provide adversary cyberspace TTP analysis to local tactic review forums.Provide situation briefs, tactical intelligence reports, cyberspace threat intelligence reports, and cyberspace malware and forensic reports.Complete guidance checklists, update on-line databases, and validate Higher Headquarters guidance.Provide Operational Preparation of the Environment (OPE) products focused on tactical tasks execution, tactical mission planning, and readiness training.Provide comprehensive threat analysis for Network Defense of AF Network (AFNET) cyber security architecture in support of DoDIN Network Defense. Qualifications5+ years experience in DoD cyber threat intelligence activities. HS Diploma or GED. Experience with the life cycle of cybersecurity threats, attacks, attack vector, and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs). Familiarity or background in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework. Experience characterizing and analyzing network traffic to identify anomalous and potential threats to network resources. Able to coordinate with enterprise‐wide cyber defense staff to validate network alerts. Experience documenting and escalating incidents (including event’s history, status, and potential impact for further action) that may cause on‐going and immediate impact to the environment. Experience performing cyber defense trend analysis and reporting. Experience with event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of and observed attack. Able to analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information. Experience determining tactics, techniques, and procedures (TTPs) for intrusion sets. Able to conduct research, analysis, and correlation across a wide range of variety of all source data sets (indications and warnings). Must be a US citizen and hold a current Top Secret clearance with SCI access (TS/SCI).
Applicants selected will be subject to a U.S. government security investigation and must meet eligibility requirements for access to classified information.
EOE/M/F/Vet/Disabled
Options Apply for this job onlineApplyShareEmail this job to a friendRefer Sorry the Share function is not working properly at this moment. Please refresh the page and try again later. Share on your newsfeed Application FAQsSoftware Powered by iCIMS
www.icims.com