CrawlJobs Logo

Junior Identity Intelligence Analyst

aevex.com Logo

AEVEX Aerospace

Location Icon

Location:
United States , Quantico

Category Icon
Category:

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

27.00 - 27.41 USD / Hour

Job Description:

Are you ready to kick-start your career in intelligence analysis and contribute to the safety and security of our nation? AEVEX Aerospace is seeking motivated and exceptionally qualified individuals to join our team as a Junior Identity Intelligence Analyst supporting the Marine Corps Intelligence Activity (MCIA) in Quantico, VA. In this role, you will be at the forefront of identity intelligence (I2), helping to analyze and manage critical information that supports national security operations.

Job Responsibility:

  • Conduct multi-source intelligence analysis, including triage, research, exploitation, and dissemination of identity-related information
  • Provide expertise across all facets of identity intelligence analysis, including biometrics, forensics, facial recognition, and cellular exploitation
  • Develop a range of analytical outputs, from biometric analysis reports to SIGINT and CELLEX-derived intelligence products
  • Utilize DONISIS, BI2R, and other intelligence systems to research, exploit, and manage identity-related information
  • Work in a shift environment to provide continuous support for identity intelligence operations
  • Coordinate with multiple organizations, including the Naval Criminal Investigative Service (NCIS) and FBI, to share intelligence
  • Use forensic methodologies to identify and exploit intelligence from seized documents and media
  • Extract and analyze facial images from various media sources, using facial recognition software to produce Facial Comparison Analysis Reports (FCAR)

Requirements:

  • 0-3 years of experience in the US Military, Law Enforcement, or Intelligence Community, with a focus on identity intelligence, SIGINT, or similar fields
  • U.S. citizenship with a current Single Scope Background Investigation (SSBI) / T5 investigation and eligibility for Sensitive Compartmented Information (SCI)
  • Experience using DONISIS, BI2R, and similar systems for research and exploitation
  • Proficient in standard office software, including MS Office, data entry, and collaboration tools
  • Ability to synthesize information from multiple sources and produce coherent, actionable intelligence products
  • Strong teamwork and communication skills
  • Ability to type accurately and efficiently
  • Meet minimum physical requirements to perform all duties and responsibilities as defined by management
  • Be prepared to sit, talk, listen, and frequently walk, use hands, and reach with arms
  • Occasionally required to stand and lift/move up to 30 pounds
  • Must complete all medical examinations required for temporary duty or full-time deployment
What we offer:
  • 401(k)-retirement plan
  • comprehensive Medical, Dental, Vision, Disability and Life insurance group coverage with a portion of the premiums paid by the company
  • professional development funds
  • Employee Assistance Plan (EAP) with counseling, legal help, child and elder care support

Additional Information:

Job Posted:
February 16, 2026

Employment Type:
Fulltime
Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Junior Identity Intelligence Analyst

Identity Intelligence Analyst (Junior-Level)

Amentum is seeking an Identity Intelligence Analyst (Junior-Level) to join our t...
Location
Location
United States , Charlottesville
Salary
Salary:
Not provided
amentum.com Logo
Amentum
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Possesses a working knowledge of applicable databases
  • ability to compile, analyze and synthesize necessary data to provide an assessment within the scope of the assigned mission and government approved format
  • Knowledgeable of and demonstrates ability to apply IC and DoD classification guidelines and procedures
  • Experience with research and intelligence analytic techniques, strong research and writing skills, and experience with basic computer applications, search engines, and data processing systems
  • Possesses a basic understanding of Identity Intelligence tradecraft
  • Capable of producing intelligence analysis with oversight and direction
  • Familiarity with I2 analytical tools and databases, including BI2R/I2AR, SOFEX, Palantir, AIDP/Maven, Query Tree, Chrome, Analyst Notebook, Open-Source research, Biometric Automated Toolset (BAT), TIDE, Pulse, QLIX
  • Demonstrates the ability to participate in analytical debate and be receptive to constructive criticism
  • Demonstrates the ability to brief mission and production related topics to internal and external government clients, military personnel, and contract audiences
  • Ability to operate as a member of a team
Job Responsibility
Job Responsibility
  • Producing all-source Identity Intelligence (I2) analysis and intelligence products in support of global missions and customers
  • Applying an understanding of I2 tradecraft to produce analysis focused on the full range of unique identifying human characteristics and modalities to include, but not limited to, fingerprints, deoxyribonucleic acid (DNA), iris scans, voiceprints, facial recognition features, and behavior for the purposes of identifying and tracking persons and networks
  • Fusing identity attributes, such as biographical, biological, behavioral, contextual, and reputational information related to individuals and intelligence associated with those attributes, to identify and assess threats of individuals and networks, their capabilities and capacity, centers of gravity, objectives, intent, and potential courses of action
  • Fulltime
Read More
Arrow Right

Senior Security Engineer

Truveta is the world’s first health provider led data platform with a vision of ...
Location
Location
United States , Seattle
Salary
Salary:
135000.00 - 180000.00 USD / Year
truveta.com Logo
Truveta
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cyber Security, Computer Science, Information Security, Information Systems, or a related field, or equivalent practical experience
  • 5+ years of experience in Security Operations (SOC), Incident Response, or Detection & Response role, with demonstrated ownership of complex security incidents
  • Hands-on experience with Microsoft Sentinel (SIEM) and Microsoft Defender XDR (Defender for Endpoint, Identity, Office 365, Cloud Apps)
  • Proficiency in KQL (Kusto Query Language) for investigations, threat hunting, and detection engineering
  • Experience designing, tuning, and maintaining SIEM detections and SOAR automation, including alert triage and response workflows
  • Solid understanding of Azure cloud architecture, core services, and native security controls
  • Familiarity with Azure Entra ID, identity security concepts, RBAC, and IAM-related threats
  • Experience with handing high-severity security incidents, including cross-team coordination and stakeholder communication
  • Familiarity with MITRE ATT&CK, threat actor techniques, and modern attack methodologies across cloud, identity, and endpoint environments
  • Experience supporting on-call rotations and working in a 24/7 or follow-the-sun SOC environment
Job Responsibility
Job Responsibility
  • Incident Response: Handle investigation and response to security incidents across endpoints, identities, email, cloud workloads, and SaaS applications
  • Act as a senior escalation point for SOC analysts during complex or ambiguous security events
  • Participate in on-call rotations and provide senior-level escalation support when needed
  • Lead or contribute to post-incident reviews (RCA, postmortems) and track remediation actions to completion
  • Ensure incidents are accurately documented for audit, compliance, and operational learning
  • Maintain and improve incident response runbooks, playbooks, and escalation procedures
  • Support incident readiness activities, including tabletop exercises and response drills
  • Detection Engineering & Automation: Develop, tune, and maintain Microsoft Sentinel analytics rules to improve detection quality and reduce false positives
  • Design and optimize KQL queries for investigations, threat hunting, and detection engineering
  • Integrate and maintain log sources and data connectors in Microsoft Sentinel, ensuring data quality and proper normalization
What we offer
What we offer
  • Interesting and meaningful work for every career stage
  • Great benefits package
  • Comprehensive benefits with strong medical, dental and vision insurance plans
  • 401K plan
  • Professional development & training opportunities for continuous learning
  • Work/life autonomy via flexible work hours and flexible paid time off
  • Generous parental leave
  • Regular team activities (virtual and in-person)
  • Fulltime
Read More
Arrow Right

Watchlist Analyst Junior

Amentum provides warning and all-source analytical support to DIA’s Defense Comb...
Location
Location
United States , Reston, Virginia
Salary
Salary:
67000.00 - 72000.00 USD / Year
amentum.com Logo
Amentum
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • TS/SCI clearance required
  • Minimum Education: High School/GED
  • Minimum Years of Experience: 2 Years
  • Watchlist Analyst – Performs all-source intelligence analysis of DoD datasets to identify and nominate known or suspected terrorists into the National Terrorist Watchlisting system
  • Develops DoD recommendations for the no-fly, selectee, or other national terrorist watch lists as appropriate
  • Reviews DoD datasets for identifying information of Known or Suspected Terrorists
  • Identifies, prioritizes, and records information from DoD datasets as specified by the Government
  • Produces analytic reports using DIA’s Watchlisting Data Organizer (WATCHDOG) and / or other internal DIA production tools
  • Prepares reports for dissemination by methods specified by the Government
Job Responsibility
Job Responsibility
  • Systematically and deliberately reviews DoD datasets assessed as likely to contain identifying information for known or suspected terrorists
  • Identity, prioritize, and record information from known DoD datasets related to known or suspected terrorists as specified by the Government
  • Crosscheck/research known or suspected terrorists against other intelligence holdings to ensure completeness of information and to avoid duplicating data entries
  • Compile information into a nomination report format as specified by the Government
  • Correctly format, classify, and address reports
  • Ensure information contained within reports is intelligible, cogent, comprehensive, and understandable, and that all reports use proper grammar and spelling
  • Meet Terrorist Identity Nomination (TIN) production schedule
  • Correct and resubmit incorrect reports and prepare reports for dissemination as record message traffic or other dissemination methods as specified by the Government
  • Provide guidance and instruction for less experienced team members assigned to Watchlisting
  • Demonstrate general knowledge and understanding of IC organizations associated with CT operations, analysis, products, and information systems
What we offer
What we offer
  • Health, dental, and vision insurance
  • Paid time off and holidays
  • Retirement benefits (including 401(k) matching)
  • Educational reimbursement
  • Parental leave
  • Employee stock purchase plan
  • Tax-saving options
  • Disability and life insurance
  • Pet insurance
  • Fulltime
Read More
Arrow Right

Senior SOC Analyst

Brunswick is in search of a Senior Security Operations Center (SOC) Analyst to j...
Location
Location
United States , Mettawa
Salary
Salary:
87800.00 - 128750.00 USD / Year
herbrucks.com Logo
Herbruck Poultry Ranch
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in cybersecurity, computer science, engineering, or related field
  • Five plus years of experience in SOC monitoring, incident response, or related fields
  • Certifications in Information Security and related disciplines are a plus
  • Demonstrated technical understanding in emerging cybersecurity threats
  • Ability to create detections aligning with the MITRE ATT&CK framework
  • Expertise in SOAR, SIEM, threat intelligence, identity management, and endpoint detection and response tools
  • Strong understanding of threats, vulnerabilities, and incident response principles
  • Excellent judgment and ability to make quick decisions in complex situations
  • Perform tasks independently and work within a fast-paced environment
  • Exceptional written and verbal communication skills across varying levels of the organization
Job Responsibility
Job Responsibility
  • Serve as a subject matter expert for a team of analysts dedicated to monitoring and responding
  • Respond to and investigate cybersecurity incidents, including those that occur off-hours as part of a scheduled on-call rotation
  • Serve as a mentor and escalation point for junior SOC analysts, assisting with day-to-day SOC requirements
  • Identify strengths and areas for improvement within the team to improve skills and knowledgebase
  • Stay current with cybersecurity threats, AI developments, risks, and vulnerabilities that could impact services
  • Create detections aligned with the MITRE ATT&CK framework and recommend improvements to leadership
  • Refine and maintain playbooks, procedures, and guidelines that align with industry best practices
  • Maintain strong partnerships with security engineering, incident response, and IT teams to improve monitoring, workflow, and response capabilities
  • Document and share information with team members to help improve analytical skills
  • Support monitoring and response metrics, KPIs, and service level objectives for security events and incidents
What we offer
What we offer
  • annual discretionary bonus
  • medical
  • dental
  • vision
  • paid vacation
  • 401k (up to 4% match)
  • Health Savings Account (with company contribution)
  • well-being program
  • product purchase discounts
  • Fulltime
Read More
Arrow Right

Senior Analyst, Security Operations Center

The Senior Analyst, Security Operations Center (SOC) is a technical leader respo...
Location
Location
United States , Charlotte
Salary
Salary:
Not provided
brightspeed.com Logo
Brightspeed
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Associate's degree in Computer Science, Information Systems, Engineering, Technology, or related field or equivalent experience/training
  • Experience managing cases/incidents
  • Ability to think analytically
  • Robust creativity and problem-solving skills
  • Knowledge of technical systems and terminology
  • Proficiency in threat management analysis and dissemination
  • Proficiency in scripting languages
  • Advanced written and verbal communication skills
Job Responsibility
Job Responsibility
  • Lead incident response efforts for high-severity and complex security events, serving as the primary technical coordinator during major incidents
  • Act as escalation point for junior analysts, providing technical guidance and decision support in real time
  • Oversee daily SOC operations, including shift management, workload distribution, and quality assurance of investigations
  • Conduct post-incident reviews and facilitate lessons-learned sessions to drive continuous improvement
  • Mentor and train junior analysts to elevate team capabilities and strengthen overall SOC maturity
  • Perform advanced threat analysis, including APT detection, multi-stage attack correlation, and deep analysis of threat actor tactics, techniques, and procedures (TTPs)
  • Lead proactive threat hunting initiatives across cloud, network, identity, and endpoint environments
  • Design and implement advanced detection rules, correlation logic, queries, and dashboards in SIEM and SOAR platforms
  • Develop custom automation playbooks to accelerate investigation, triage, and containment processes
  • Evaluate and recommend enhanced SOC technologies, detection techniques, and analytic capabilities
What we offer
What we offer
  • Competitive compensation
  • Comprehensive benefits
  • Medical, dental, vision, and life insurance
  • Employee assistance program
  • 401K plan with company match
  • Voluntary benefits
  • Fulltime
Read More
Arrow Right

Watchlist Analyst Junior

Amentum provides warning and all-source analytical support to DIA’s Defense Comb...
Location
Location
United States , Reston
Salary
Salary:
67000.00 - 72000.00 USD / Year
amentum.com Logo
Amentum
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • TS/SCI clearance
  • High School/GED
  • Minimum 2 years of experience
  • Systematically review DoD datasets for terrorist identifying information
  • Identity, prioritize, and record information on known or suspected terrorists
  • Crosscheck/research against other intelligence holdings
  • Compile information into nomination reports
  • Meet Terrorist Identity Nomination (TIN) production schedule
  • Correct and resubmit incorrect reports
  • Provide guidance for less experienced team members
Job Responsibility
Job Responsibility
  • Deliver national watchlisting support to TIDE database
  • Provide expert assessments for Pentagon/Joint Staff
  • Provide 24/7/365 support to DoD and senior policy decision makers
  • Support Congressionally-mandated Prisoner of War/Missing in Action cell
  • Support global hostage threats or events against U.S. citizens
What we offer
What we offer
  • Health, dental, and vision insurance
  • Paid time off and holidays
  • Retirement benefits (including 401(k) matching)
  • Educational reimbursement
  • Parental leave
  • Employee stock purchase plan
  • Tax-saving options
  • Disability and life insurance
  • Pet insurance
  • Fulltime
Read More
Arrow Right

Information Security Specialist/Analyst III

The Information Security Specialist/Analyst III reports to the Manager, Security...
Location
Location
United States
Salary
Salary:
Not provided
muschealth.org Logo
MUSC Health
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in information security, information assurance, computer science, or a related field with 5 years of IT security experience
  • or 10 years of hands-on experience in information security or related IT experience required, at least 6 of which must be directly related IT security experience
  • or a Master's degree in information security, information assurance, computer science, or a related field, and 3 years of IT security experience required
  • Advanced knowledge of information security principles, risk management, and regulatory compliance (HIPAA, FERPA, NIST, etc.)
  • Strong analytical and problem-solving skills with the ability to make decisions under pressure
  • Hands-on experience with Crowdstrike EDR, SIEM, IDS/IPS, vulnerability management, and threat intelligence tools
  • Familiarity with cloud security (Azure, AWS) and identity management solutions
  • Advanced Understanding on the administration and securing of various operating systems and enterprise applications with advanced security best practices
  • Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant language
  • Mentor junior analysts and contribute to the development of security standards, procedures, and playbooks
Job Responsibility
Job Responsibility
  • Serve as a lead escalation point for security incidents, overseeing detection, investigation, containment, and remediation within a CrowdStrike EDR environment across a healthcare infrastructure
  • Analyze findings from security monitoring systems, including Intrusion Detection/Prevention Systems (ID/PS) and Security Information Event Management (SIEM) consoles, to identify and respond to potential security incidents and data breaches
  • Perform cyber security incident handling, tracking and reporting
  • Utilize professional judgment and institutional knowledge to assess risk levels, conduct forensic investigations, isolate malware, identify attack vectors, provide guidance on remediation planning, and prioritize remediation efforts
  • Respond to relevant service requests received from end users (e.g. for investigation of security events)
  • Collaborate with internal Security Operations Center (SOC) teams and external Managed Security Service Providers (MSSPs) to contain and remediate security incidents
  • Configure, manage, and optimize SIEM platforms (Crowdstrike and/or Microsoft Sentinel) to enhance threat detection and response capabilities
  • Lead and manage large scale security-related projects, including tool implementations, upgrades, and process improvements
  • Conduct vulnerability assessments to identify security risks and report findings to system owners
  • Manage workflows to ensure that protected assets are properly assessed in a timely manner
  • Fulltime
Read More
Arrow Right

Watchlist Analyst Junior

Amentum provides warning and all-source analytical support to DIA’s Defense Comb...
Location
Location
United States , Reston, Virginia
Salary
Salary:
67000.00 - 72000.00 USD / Year
amentum.com Logo
Amentum
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • TS/SCI clearance
  • High School/GED
  • Minimum 2 years of experience
  • Systematically and deliberately reviews DoD datasets assessed as likely to contain identifying information for known or suspected terrorists
  • Identity, prioritize, and record information from known DoD datasets related to known or suspected terrorists as specified by the Government
  • Crosscheck/research known or suspected terrorists against other intelligence holdings
  • Compile information into a nomination report format as specified by the Government
  • Meet Terrorist Identity Nomination (TIN) production schedule
  • Correct and resubmit incorrect reports
  • Provide guidance and instruction for less experienced team members
Job Responsibility
Job Responsibility
  • Performs all-source intelligence analysis of DoD datasets to identify and nominate known or suspected terrorists into the National Terrorist Watchlisting system
  • Develops DoD recommendations for the no-fly, selectee, or other national terrorist watch lists as appropriate, to fulfill the DoD component of Homeland Security Presidential Directives (HSPDs) 6 and 11 and reviews DoD datasets for identifying information of Known or Suspected Terrorists
  • and identifies, prioritizes, and records information from DoD datasets as specified by the Government
  • Produces analytic reports using DIA’s Watchlisting Data Organizer (WATCHDOG) and / or other internal DIA production tools
  • Prepares reports for dissemination by methods specified by the Government
What we offer
What we offer
  • Health, dental, and vision insurance
  • Paid time off and holidays
  • Retirement benefits (including 401(k) matching)
  • Educational reimbursement
  • Parental leave
  • Employee stock purchase plan
  • Tax-saving options
  • Disability and life insurance
  • Pet insurance
  • Fulltime
Read More
Arrow Right