Employer:Metis
Location: Quantico
Job Code: 90
# of Openings: 5
Qualifications:
Must possess a Bachelor’s Degree (or higher level degree).
Must hold an active TS/SCI clearance.
Civilian US Government experience working CI investigations and HUMINT collection operations (5-10 years); or military experience working CI investigations and collection operations and HUMINT operations (5-10 years).
Five to eight years conducting CI/ HUMINT targeting directed at detecting, deterring, or neutralizing threats to U.S. Government personnel, programs, and technology.
- Knowledge of a wide range of principles, techniques, methods, processes, and technology involved in intelligence and counterintelligence operations. Experience in at least two of the CI functions (analysis, collections, operations, and investigations.
- Demonstrated expertise in cyber intelligence methodologies and practical understanding of relevant information technologies and computer/telecommunications network designs and operations.
- Ability to work collaboratively with intelligence analysts, operational implementers and information technology specialists to identify and assess threats to cleared contractors computer networks.
- Knowledge of intrusion data, electronics, information on US systems (computer and weapons), and forensics data. Knowledge of Cyber CI collection and operations and document and media exploitation.
- Understand the threat to cleared contractors (CC) and build risk based products to advocate risk based decision making.
- Working knowledge of Intelligence Oversight considerations.
- Experience in Intelligence reporting, to include Intelligence Information Reports (IIR) and Investigative correspondence (SCR, LHM) consistent with community standards.
- National level liaison experience with both the U.S. Intelligence and Law Enforcement Community Knowledge of multiple operating system fundamentals, understanding and practical experience with core Internet protocols (e.g., TCP/IP, IP, UDP, DNS, SMTP, HTTP, etc), intrusion methodologies in a Windows or Unix/Linux environment, basic malicious activity concepts as well as the structure, approach and strategy of exploitation tools and techniques, basic physical computer components and architecture.
- Ability to assimilate new information and effectively incorporate this information into the management decision-making process. Requires knowledge and understanding of the functions of bureaucratic structures within DoD, its components, and other involved Federal agencies.
- Skill in oral and written communications, presenting complex, highly technical information to technical and non-technical audiences both written and verbally.
- Extensive knowledge of intelligence and law enforcement databases and resources including Palantir.
- Extensive knowledge of structured analytic techniques and analytical tradecraft.
- Experience leveraging and integrating Intelligence Analysis into the CI Operational Cycle.
- High proficiency in IC databases, to include Palantir.