Target Network Analyst - Intermediate at Zolon Tech Solutions, Inc.
Springfield, VA
About the Job
Title : Target Network Analyst - Intermediate
Location : Springfield, VA
Duration : Full Time
Job Description:
Thanks&Regards
Jatin Sehgal
ZolonTech
Location : Springfield, VA
Duration : Full Time
Job Description:
- Conducts advanced analysis of collection and open-source data to ensure target continuity; to profile targets and their activities; and develop techniques to gain more target information.
- Determines how targets communicate, move, operate and live based on knowledge of target technologies, digital networks and the applications on them.
- Active TS/SCI Clearance
- IAT Level II and Two Penetration Testing Certifications (e.g., GPEN, GWAT, GCIH, CEH, GPYC, LPT, CPT)
- Provide expertise to course of action development.
- Classify documents in accordance with classification guidelines.
- Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas.
- Compile, integrate, and/or interpret all-source data for intelligence or vulnerability value with respect to specific targets.
- Identify and conduct analysis of target communications to identify information essential to support operations.
- Conduct nodal analysis.
- Conduct quality control to determine validity and relevance of information gathered about networks.
- Conduct target research and analysis.
- Determine what technologies are used by a given target.
- Apply analytic techniques to gain more target information.
- Generate and evaluate the effectiveness of network analysis strategies.
- Gather information about networks through traditional and alternative techniques, (e.g., social network analysis, call-chaining, traffic analysis.)
- Generate requests for information.
- Identify and evaluate threat critical capabilities, requirements, and vulnerabilities.
- Identify collection gaps and potential collection strategies against targets.
- Identify network components and their functionality to enable analysis and target development.
- Make recommendations to guide collection in support of customer requirements.
- Provide subject matter expertise to development of exercises.
- Perform content and/or metadata analysis to meet organization objectives.
- Profile targets and their activities.
- Provide target recommendations which meet leadership objectives.
- Review appropriate information sources to determine validity and relevance of information gathered.
- Reconstruct networks in diagram or report format.
- Research communications trends in emerging technologies (in computer and telephony networks, satellite, cable, and wireless) in both open and classified sources.
- Knowledge of computer networking concepts and protocols, and network security methodologies.
- Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
- Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
- Knowledge of cybersecurity and privacy principles.
- Knowledge of cyber threats and vulnerabilities.
- Knowledge of specific operational impacts of cybersecurity lapses.
- Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
- Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
- Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
- Knowledge of website types, administration, functions, and content management system (CMS).
- Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).
- Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc.
- Knowledge of collection sources including conventional and non-conventional sources.
- Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.)
- Skill in analyzing a target's communication networks.
- Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses).
- Skill in assessing the applicability of available analytical tools to various situations.
- Skill in conducting non-attributable research.
- Skill in determining the physical location of network devices.
- Skill in evaluating data sources for relevance, reliability, and objectivity.
- Skill in evaluating information to recognize relevance, priority, etc.
- Skill in recognizing technical information that may be used for leads for metadata analysis.
- Skill in researching essential information.
- Skill in reviewing and editing target materials.
- Skill in synthesizing, analyzing, and prioritizing meaning across data sets.
- Skill in target network anomaly identification (e.g., intrusions, dataflow or processing, target implementation of new technologies).
- Skill in using geospatial data and applying geospatial resources.
- Skill in using research methods including multiple, different sources to reconstruct a target network.
- Skill in writing about facts and ideas in a clear, convincing, and organized manner.
- Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
- Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
- Ability to clearly articulate intelligence requirements into well-formulated research questions and requests for information.
- Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
- Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.
- Ability to exercise judgment when policies are not well-defined.
- Ability to focus research efforts to meet the customer's decision-making needs.
- Ability to function effectively in a dynamic, fast-paced environment.
Thanks&Regards
Jatin Sehgal
ZolonTech