Knowledge of: the Joint Targeting Cycle; intelligence support to planning, execution, and assessment; target vetting and validation procedures; governing authorities for cyber targeting; collateral damage and effects estimation; combat assessment (i.e., BDA, MEA, and RR); target development (i.e., concepts, roles, responsibilities, products, etc.); Intelligence Community (IC), to include members, structure, and associated missions; IC classification and control markings standards; intelligence disciplines; information operations (IO) concepts; Computer Network Operations (CNO) terminology/lexicon; fundamental CNO concepts (i.e., CNE, CNA, CND), principles, capabilities, limitations, and effects; telecommunication fundamentals; Operations Security (OPSEC); computer networking fundamentals (i.e., basic components of a network, types of networks, etc.); basic physical computer components and architecture, including the functions; of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage); physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.; attack methods and techniques (DDoS, brute force, spoofing, etc.); current computer-based intrusion sets; common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.); TCP/IP networking protocols; the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection); virtualization products (VMware, Virtual PC); network traffic analysis methods; OSI model and underlying networking protocols; the basic structure, architecture, and design of modern digital and telephony networks; wireless technologies (e.g., cellular, satellite, GSM, etc.) to include the basic structure, architecture, and design of modern wireless communications systems; the common networking protocols, services (e.g., web, mail, DNS), and how they interact to provide network communications; the ways in which adversaries use the Internet; NSA's exploitation of digital networks; a wide range of basic communications media concepts and terminology (e.g., computer and telephony networks, satellite, cable, wireless); basic malicious activity concepts (e.g., foot printing, scanning and enumeration); data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media, etc.); encryption algorithms and tools (e.g., SSL, PGP); evolving/emerging communications technologies; how Internet applications work (SMTP email, web-based email, chat clients, VOIP); Internet Network Addressing (IP addresses, Classless Inter-Domain Routing, TCP/UDP Port numbering); a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.); host-based security products and how they affect exploitation and vulnerability; how modern digital and telephony networks impact computer network operations; how modern wireless communications systems impact computer network operations; malware; database administration and maintenance; general SCADA system components; friendly CNO capabilities and tools; target estimated repair and recuperation times; IO/CNO support or enabling processes (e.g., BDI, CIPE, BDA); joint military operations, including command and control (C2) processes and military decision making process; the structure and intent of military OPLANs, CONPLANs, orders, and standing rules of engagement.
Candidate will conduct re-occurring analysis on the Governments Cyber program to identify and communicate findings requiring corrective action for senior, lateral, and subordinate Weapons and Tactics units.
Additional Responsibilities Include, but are not Limited To:
- Provide Government training specific to cyber weapons and tactics for recurring tasks and incorporating new equipment, systems and procedures. Update Government developed curriculum and plan and schedule training.
- Check multiple sources daily for relevant cyber related weapons and tactics information.
- Research and analyze existing and emerging cyberspace threats and defense tactics, and immediately communicate threats to Government.
- Facilitate Government meetings, provide meeting agenda with relevant/current issues, provide relevant information and suggestions, and analyze the process.
- Collect, analyze, and track the progress of Tactics Improvement Proposals (TIP).
- Develop, document, analyze, report, and disseminate cyberspace Tactics, Techniques, and Procedures (TTPs) for existing and emerging technologies, and recommend improvements for unit operations.
- Provide changes and updates to, and analyze and report on Weapons and Tactics to the Government
- Document cyber Government requirements.
- Analyze and report on requirements for instructor and evaluator certification.
- Participate, document, and analyze Conferences for process improvements.
- Develop, post, and maintain records of all reports in an appropriate electronic Government approved shared location.
- Assist with proposal development, if necessary.
- Minimum three (3) years of experience of the Governments infrastructure and Defensive Cyber Operations (DCO), Defensive GIG Operations (DGO), Cyberspace Defensive Analysis (CDA), and Offensive Cyberspace Operations (OCO) mission sets and their roles and responsibilities
- Bachelors Degree preferred
- Security+ Certification
- Certified Ethical Hacker (CEH) Certification
- Must be able to effectively communicate with customer and fulfill all duties and responsibilities as listed in the contract.
- Must be proficient in Microsoft Office suite including, but not limited to: Word, PowerPoint, Excel, and Outlook.
- Thorough understanding of the Tactics, Techniques and Procedures (TTP) process.
- You must possess an active TS/SCI clearance.
Role: Weapons and Tactics Innovation Assessment Analyst
Location: San Antonio,
Apply for this job now.