Enable job alerts via email!

Open-Source Intelligence Specialist : Centurion

Isilumko Staffing (JHB)

Centurion

On-site

ZAR 800,000 - 1,200,000

Full time

4 days ago
Be an early applicant

Job summary

A staffing agency in South Africa seeks an Open-Source Intelligence Specialist in Centurion. The role involves gathering and analyzing open-source data relevant to financial intelligence using specialized technology. Candidates should have relevant qualifications, along with a minimum of six years of experience and advanced computer literacy. The position also requires compliance with legal standards and producing timely reports for various stakeholders.

Qualifications

  • Minimum six years of relevant experience.
  • Familiarity with cyber threats, defenses, motivations, and techniques.
  • Experience with intelligence analysis tools.

Responsibilities

  • Direct the collection of open-source information using specialized technology.
  • Analyze data and produce timely reports for financial intelligence.
  • Lead briefings and presentations for stakeholders and clients.

Skills

Managing and leading work teams
Advanced computer literacy
Ability to maintain professional contacts in law enforcement, government, and industry
Translating complex data into actionable recommendations
Understanding of operating systems and network security

Education

Relevant university degree
Postgraduate studies preferred

Job description

SUMMARY :
POSITION INFO :

Open-Source Intelligence Specialist : Centurion

Open-Source Intelligence Specialist will be part of the Monitoring and Analysis (MAA) Division, reporting to the Senior Operations Manager of the Intelligence Support Service Business Unit.

Required expertise includes directing the collection of open-source information using specialized technology from sources like the internet, dark web, deep web, social media, and other authorized platforms.

Your experience should include :

  • Managing and leading work teams
  • Identifying technical equipment needs for gathering and analyzing open-source material relevant to financial intelligence
  • Setting up, applying, and maintaining technical equipment for open-source data collection over short to long-term periods
  • Implementing measures to ensure compliance with legal standards during information gathering
  • Developing SOPs for gathering and analyzing open-source data for financial intelligence
  • Analyzing data and producing timely reports for financial intelligence
  • Applying diagnostic skills to identify relationships and causal links impacting events
  • Producing complex reports with inferences and conclusions for medium-term planning
  • Leading briefings and presentations for stakeholders and clients
  • Disseminating information as per timelines and specifications
  • Utilizing technical equipment effectively
  • Performing quality assurance to ensure data integrity
  • Resolving technical issues promptly
  • Reviewing assessments related to AML/CFT and proceeds of crime based on open-source info
  • Conducting technical surveillance countermeasures
  • Supporting information gathering within the department
  • Leading and reviewing team work
  • Providing training as needed
  • Performing other duties as assigned

Education + Experience :

  • Relevant university degree, pursuing postgraduate studies preferred
  • Minimum six years of relevant experience
  • Advanced computer literacy
  • Completed internal training on systems, policies, procedures
  • Ability to understand and explain behaviors of complex organizations
  • Skill in translating complex data into actionable recommendations
  • Familiarity with cyber threats, defenses, motivations, and techniques
  • Advanced skills in deploying open-source technology
  • Experience with intelligence analysis tools and the intelligence cycle
  • Experience in converting raw data into actionable financial intelligence
  • Ability to maintain professional contacts in law enforcement, government, and industry

Cyber Security :

  • Understanding of operating systems and network security
  • Knowledge of malicious code and vulnerabilities
  • Familiarity with tactics of cybercriminals, especially on the dark web
  • Ability to produce timely recommendations and assessments

Resourcing process :

  • Communication and feedback will be provided only to shortlisted candidates
  • Candidates should email a detailed profile for application
  • Profiles and information will be handled with respect and confidentiality
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.