Skill in writing, reviewing and editing cyber-related Intelligence/assessment products from multiple sources.
Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes.
Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
Ability to effectively collaborate via virtual teams.
Ability to evaluate information for reliability, validity, and relevance.
Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.
Ability to focus research efforts to meet the customer's decision-making needs.
Ability to function effectively in a dynamic, fast-paced environment.
Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise.
Ability to identify intelligence gaps.
Ability to recognize and mitigate cognitive biases which may affect analysis.
Ability to recognize and mitigate deception in reporting and analysis.
Ability to think critically.
Ability to think like threat actors.
Ability to utilize multiple intelligence sources across all intelligence disciplines.
Answer requests for information.
Provide subject matter expertise to the development of a common operational picture.
Maintain a common intelligence picture.
Provide subject matter expertise to the development of cyber operations specific indicators.
Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.
Assist in the identification of intelligence collection shortfalls.
Brief threat and/or target current situations.
Collaborate with intelligence analysts/targeting organizations involved in related areas.
Conduct in-depth research and analysis.
Conduct nodal analysis.
Develop information requirements necessary for answering priority information requests.
Evaluate threat decision-making processes.
Identify threats to Blue Force vulnerabilities.
Generate requests for information.
Identify threat tactics, and methodologies.
Identify intelligence gaps and shortfalls.
Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets.
Monitor and report on validated threat activities.
Monitor open source websites for hostile content directed towards organizational or partner interests.
Monitor operational environment and report on adversarial activities which fulfill leadership's priority information requirements.
Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
Provide subject-matter expertise and support to planning/developmental forums and working groups as appropriate.
Provide current intelligence support to critical internal/external stakeholders as appropriate.
Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations.
Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations.
Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations.
Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities.
Report intelligence-derived significant network events and intrusions.
Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up-to-date.
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.