This role is responsible for leading and conducting fused intelligence analysis to enable the tracking and exploitation of Malicious Cyber Actors’ tactics, training, and procedures (TTPs), indicators of compromise (IOCs), and to develop a range of other heuristic and pattern of life informational products to support Whole-of-Government effects-based solutions to deny adversary access and ability to exploit US critical technologies and directly supports Law Enforcement/Counterintelligence (LE/CI) collections operations and investigative cases. This role requires extensive experience as a liaison with external commands and stakeholders, integrating original analysis into actionable outcomes through coordinated multi-agency operations and support to CI collection missions and investigations.
Working as an expert in the field, research and evaluate technical and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and US and DoD information networks. Prepares intelligence assessments, technical information papers, and cyber threat profiles of current events based on the sophisticated collection, research, and analysis of classified and Open-Source information; correlates threat data from various sources. Develops and maintains analytical procedures to meet changing requirements and ensure unhindered operations. Collects data using a combination of standard intelligence methods and business processes. Responsible for producing high-quality papers, presentations, recommendations, and findings for senior US government intelligence and network operations officials.