This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Amentum has an opportunity for a highly qualified Cyber Intelligence Operations Analyst to play a pivotal role in providing actionable intelligence to support cyber operations. This position demands a keen understanding of cyber threats, trends, and tactics, as well as the ability to analyze and synthesize complex data from various sources. This position requires understanding and execution of intelligence support to offensive cyberspace operations. The analyst will collaborate closely with cyber operations teams to identify, assess, and mitigate cyber risks, ensuring the protection and resilience of critical network infrastructure. Utilizing established analytical tradecraft and Department of War Intelligence Cycle gathers and analyzes all data which provides intelligence support to cyberspace operations. Support will span full-spectrum (offense and defense) cyberspace operations and will enable: planning; target system analysis; collection management; coordination of intelligence community production; intelligence gap analysis; adversary tactics, techniques, and procedures; threat analysis of Mission Relevant Terrain – Cyber or Cyber Key Terrain; target development; and intelligence requirements development.
Job Responsibility:
Conduct in-depth analysis of cyber threat intelligence, including emerging malware, vulnerabilities, and attack vectors
Collect, evaluate, and fuse intelligence from diverse sources, including open-source intelligence (OSINT), signals intelligence (SIGINT), human intelligence (HUMINT), and technical intelligence (TECHINT). Identify correlations and patterns to enhance situational awareness and predictive analysis
Assess the potential impact of cyber threats on network infrastructure and operations. Collaborate with cyber defense teams to develop and implement mitigation strategies and countermeasures
Provide intelligence support during cyber incident response activities, including analysis of indicators of compromise (IOCs), attribution of cyber-attacks, and identification of adversary tactics, techniques, and procedures (TTPs)
Prepare and deliver clear and concise intelligence products, including reports, briefings, and presentations, for a diverse audience, including senior leadership, operational stakeholders, and technical teams
Foster collaboration and information sharing with internal and external stakeholders, including other intelligence agencies, law enforcement, industry partners, and allied nations, to enhance cyber threat awareness and response capabilities
Stay abreast of emerging cyber threats, technologies, and methodologies through continuous research and professional development. Contribute to the development of new analytical techniques, tools, and processes to improve intelligence analysis and cyber defense capabilities
Conduct target system analysis to support entity of interest for offensive cyberspace operations, coordinate for intelligence production and analysis to support advance technical development for offensive operations
Execute collection management drawing subordinate unit intelligence requirements and overseeing their progress through the various means of collection to resolve intelligence gaps
Develop Targets through Advanced Target development to achieve vetted and validated COCOM level targets for mission package execution
Maintain various mission profile intelligence documentation requirements to support execution offensive cyberspace operations
Conduct Mission Analysis process and know and be able to support intelligence preparation of the battlespace to support operational planning and entity of interest development for further technical analysis
This position may require up to 10% travel
Requirements:
Bachelor’s degree in computer science, Information Security, Cybersecurity, Intelligence/International Studies, or related field
Minimum of 4 years of experience in intelligence analysis with a focus on cyber threats or operations
Proficiency in intelligence analysis tools and techniques, such as data visualization, link analysis, and threat modeling
Familiarity with Intelligence inputs to MDMP, JPP, and the Joint Targeting Cycle
Active Top-Secret Clearance with SCI eligibility and current CI Polygraph
US Citizenship is required to obtain a Top-Secret Clearance
Nice to have:
Master’s degree in computer science, Information Security, Cybersecurity, Intelligence Studies, Security Studies, or related field
10+ years of experience in intelligence analysis with a focus on cyber threats and operations