More jobs:
Cyber Intelligence Analyst Security Clearance
Job in
Wahiawa, Honolulu County, Hawaii, 96786, USA
Listed on 2025-12-19
Listing for:
Amentum
Full Time
position Listed on 2025-12-19
Job specializations:
-
IT/Tech
Cybersecurity, Information Security
Job Description & How to Apply Below
Amentum has a great opportunity for a Cyber Intelligence Analyst to support the Cyber Group ONE Command, located in Wahiawa, HI. The Cyber Intelligence Analyst will be a key member of our team, responsible for analyzing complex cyber threat data, producing actionable intelligence, and supporting cyber operations. This role requires a strong understanding of both intelligence analysis methodologies and network defense principles.
The ideal candidate will possess experience in SIGINT analysis, a solid foundation in computer science or a related field, and a passion for staying ahead of the evolving cyber threat landscape. This position may require up to 10% travel. You would be an excellent candidate for this position if you:
* Are a self-starter professional who takes initiative to work independently, after initial instructions are provided.
* Can troubleshoot and seek operational solutions by coordinating with various team members and stakeholders through multiple communication channels.
* Have strong communication skills in gathering information and presenting results.
* Apply critical and analytical thinking to analyze large amounts of data and make connections.
* Enjoy working in a fast-paced, dynamic environment.
Duties and Responsibilities:
* Evaluate target opportunities using all-source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans.
* Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and demonstrate a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.
* Develop new tradecraft needed to perform this analysis as technologies evolve.
* Work collaboratively with government, military, and other contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.
* Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques: query, merge, enrich, evaluate, and pivot within data to attain and share insights.
* Distill, document, contextualize and share findings--including any new tradecraft that is developed--with teammates, stakeholders, and intelligence consumers.
* Conduct in-depth analysis of cyber threat intelligence, including emerging malware, vulnerabilities, and attack vectors.
* Collect, evaluate, and fuse intelligence from diverse sources, including open-source intelligence (OSINT), signals intelligence (SIGINT), and Human intelligence (HUMINT). Identify correlations and patterns to enhance situational awareness and predictive analysis.
* Assess the potential impact of cyber threats on network infrastructure and operations. Collaborate with cyber defense teams to develop and implement mitigation strategies and countermeasures.
* Provide intelligence support during cyber incident response activities, including analysis of indicators of compromise (IOCs), attribution of cyber-attacks, and identification of adversary tactics, techniques, and procedures (TTPs).
* Prepare and deliver clear and concise intelligence products, including reports, briefings, and presentations, for a diverse audience, including senior leadership, operational stakeholders, and technical teams.
* Foster collaboration and information sharing with internal and external stakeholders, including other intelligence agencies, law enforcement, industry partners, and allied nations, to enhance cyber threat awareness and response capabilities.
* Stay abreast of emerging cyber threats, technologies, and methodologies through continuous research and professional development.
* Use information collected from a variety of sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur.
* Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems.
* Develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols (IOTs), and advanced network security.
Minimum Requirements:
* Demonstrative experience with SIGINT and Analytics and Modernization (AMOD)
* Deep understanding of processing PCAP/packets efficiently and experience with cyber discovery and identification of indicators of compromise (IOCs).
* Demonstrative experience with network protocol analyzer such as Wireshark, TCP Dump, etc.
* Experience with sustained Intrusion Set - ability to link indicator and target-related information.
* Familiarization with scripting such as python or object-oriented.
* Experience with correlating Network Traffic collection from SIGINT resources.
* Experience with tradecraft associated with Persona/Capability/Infrastructure development.
* Excellent written and verbal…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×