Work you'll do
Seeking Targeting Digital Network Analysts to support in intelligence functions, analytics, and cyber investigations and operations. Analysts will be assigned to a variety of core analytical tasks or projects.
In this role you will:
- Apply data and technical expertise to perform file signature analysis, real-time forensic analysis, and report intelligence-derived significant network events and intrusions
- Conduct research and analysis at the operational or strategic level
- Communicate your assessments in operational- or strategic-level analytic intelligence products and through oral briefings
- Threat analysis includes assessments identifying and describing threat actors, activities, platforms, and targets-as well as how they interact-and providing an understanding of the presence, intent, and capabilities of the identified threats
The team
Deloitte's Government and Public Services (GPS) practice - our people, ideas, technology and outcomes-is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of more than 15,000 professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.
Qualifications
Required:
- Active TS/SCI with Polygraph security clearance required
- Must meet the following years of experience and education requirements:
- 9 years of experience (no degree) OR
- AA degree + 7 years of experience
- Bachelor's degree + 5 years of experience
- Master's degree + 3 years of experience
- PhD + 2 years of experience
- Prior experience supporting a variety of core analytical tasks
- Conducted research and analysis at the operational or strategic level
- Experience performing file signature analysis, real-time forensic analysis, and report intelligence-derived significant network events and intrusions
- Ability to build and maintain subject matter expertise in an assigned substantive or functional area
- Experience reviewing source reporting and raw intelligence to determine its value, significance, and relevance
- Ability to communicate assessments in operational- or strategic-level analytic intelligence products and through oral briefings
- Experience performing threat analysis, to include assessments identifying and describing threat actors, activities, platforms, and targets-as well as how they interact-and providing an understanding of the presence, intent, and capabilities of the identified threats
- Relevant experience requires aspects of Intelligence Analysis (e.g. target development, social network analysis, and metadata analysis)
- Ability to assess how environmental variables may affect threats (known or emerging) in a domain
- Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future
- Ability to travel 25% based on the work you do and the clients and industries/sectors you serve
- Must be onsite for this role
Preferred:
- Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will count as 6 months of experience).
- Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
#LI-DP3
#NDO 2023