Job Title: Cyber Intelligence Analyst
Location: Quantico, VA
Position Requirements
Active DoD Top Secret / SCI Clearance
MINIMUM SKILLS REQUIRED:
- Defense intelligence all-source analysis experience working with intelligence tools/data sources to solve complex problems.
- Ability to research, analyze, document, and convey technical information.
- Experience providing technical expertise on how the software industry functions and operates, to include knowledge of programming services, system services, open source, and software as a service (SaaS)
- Excellent verbal, writing, and briefing skills with the ability to communicate both technical and operational information to wide-ranging audiences.
- Cyber operations background with a deep understanding of current foreign threats
- Demonstrate knowledge of current cyber threat actors/intrusion techniques and cyber threat avenues of attack
- Work independently with little to no guidance and/or direction to develop and maintain overall analytical production
DESIRED SKILLS:
- Ability to develop comprehensive threat analysis across the Net-Centric/cyber domain with a special emphasis on cyber threat capabilities
- Extensive knowledge on the software development lifecycle (SDLC)
- Understanding of adversarial capabilities exploit to supply chains
- Cyber intelligence analysis experience
- Attention to detail with strong organizational skills
- Functional knowledge of emerging and current cyber threats to include familiarity with operational, developmental and testing threat exploitation
- Understanding of Defense Acquisition Lifecycle
PRIMARY DUTIES, RESPONSIBILITIES & ESSENTIAL JOB FUNCTIONS:
- Advise, assist, and support in the research and production of all-source counterintelligence analysis on foreign intelligence services intent and capability to exploit, sabotage, subvert, or otherwise disrupt the supply chains for both COTS and custom designed software
- Provide input in and response to critical requests for information, finished intelligence production
- Conduct open source research using subscription data, commercial data, and other openly available sources
- Define threat concepts to identified components, platforms and/or systems
- Evaluate cyber threats to inform threat realism for evaluating operational effectiveness, suitability, and survivability of military systems
- Determine cyber threat resource requirements, availability, adequacy, and define gap between cyber threat emulation capability and the actual threat
- Develop briefings and analytic products to define threat environments
- Coordinate with intelligence, acquisition and industry communities
Top Skills
What We Do
Noetic is a dynamic, technical small business where bright minds harness the power of leading technology to enhance security in our networked world.
At Noetic, we pursue our mission of protecting the American experience by applying our innovations and technical excellence across more than 10 Federal DoD and Civilian organizations including those in Defense, Homeland Security, and Intelligence. Noetic is an 8(a), WOSB, HUBZone certified small business. Our contract vehicles include GSA STARS III, GSA MAS, and SeaPort NxG. Noetic is an 8(a), WOSB, HUBZone certified small business. Our capabilities include software development, cybersecurity, advanced analytics, intelligence analysis, and information technology.






