Req ID: 0136
Cyber Systems Analyst (Junior) (3 yrs experience and Bachelor's degree) - Quantico, Virginia
​
Clearance Level - TS/SCI (must possess or be able to obtain)
​
-
Assess the cybersecurity posture of a USMC defense program, ensuring the program is evolving with the best cybersecurity practices, prioritizing cyber threats based on factual cyber analysis.
-
Analyze foreign capabilities to detect, disrupt, and deny USMC emissions and signals throughout the cyber kill chain, to include, but not limited to emissions from targeting, communications, and intelligence, surveillance, and reconnaissance (ISR) assets, reversible and non-reversible attacks.
-
Identify, monitor, and assess advancements in emerging and commercial technologies that could be employed by state and non-state actors to detect, disrupt, and deny USMC acquisition programs’ network infrastructure.
-
Identify significant risk characteristics of the environment such as classification of network, baseline activity, architecture, operating system, services, connectivity and bandwidth.
-
Identify the limits of the network to be collected against.
-
Establish limits of the supporting or connected networks that may need to be collected against.
-
Evaluate existing databases and identify intelligence gaps.
-
Use open source to gather Publicly Available Information (PAI).
-
Explore the physical battlespace; how could the environment affect tactical operations.
-
Define the battlespace effects.
-
Analyze the battlespace environment for information, services and networks, such as confidentiality, integrity, availability; and protect, detect, respond, restore and conduct reviews.
-
Analyze other characteristics of the battlespace such as security, auditing procedures, and backup systems. Evaluate the adversary on physical location of all assets, architecture and automation skills, security and policies, baseline activity, peculiarities and vulnerabilities, capabilities, and conclusions that address: Rules of Engagement (ROE) for Information Assurance (IA), Computer Network Defense (CND) and Computer Network Attack (CNA)
-
Determine adversary’s Courses of Action (COA).
-
Identify the adversary’s likely objectives and desired end state.
-
Identify the full set of COA’s available to the adversary, at a minimum the most likely and most dangerous should be developed.
-
Develop COA’s based on enemy perception of friendly information architecture (reverse cyber IPB).
-
Evaluate and prioritize each adversary COA.
-
Continue to refine COA’s as time and new information allow.
-
Evaluate foreign Computer Network Defense (CND) and Computer Network Attack (CNA) capabilities, limitations, and vulnerabilities.
-
Assess potential vulnerabilities of USMC tactical systems to CNA to include systems related to targeting, ISR, and navigation assets.
-
Provide portfolio specific analysis, expertise, and intelligence production as specified below.
-
Conduct Threat Steering Groups with members across USMC Combat Development & Integration to identify key factors and significant risk drivers for potential materiel solutions that may inform lifecycle cost, performance, schedule, and other acquisition decision making.
-
Produce and deliver Validated Online Lifecycle Threat Reports (VOLTs), Critical Intelligence Parameters (CIPs), and Capability Development Threat Summaries to support Marine Corps Acquisition Programs across the Joint Capabilities Integration and Development System (JCIDS) process, to support the Defense Acquisition System.
-
Maintain knowledge and proficiency of air platforms and weapon systems in the air domain, including but not limited to: fixed wing aircraft, rotor wing aircraft, unmanned arial vehicles, surface to air missiles, air to air missiles.
-
Conduct All-Source analysis and assess basic, emerging, disruptive, and breakthrough technology that could potentially be applied to military/dual use systems that threaten USMC, or that enable systems that threaten USMC technology and its military application(s) by foreign states and non-state actors.
-
Produce assessments projecting the discovery and development of advanced technologies up to and including technology readiness level (TRL) 6 and the potential impact to USMC Operational Forces and Force Design 2030.
-
Produce original authoritative intelligence independently and in collaboration with other Service Intelligence Centers and members of STIC working groups.
-
Conducts all-source analytic production of future and current leading-edge technologies and their military applications worldwide. Projects the discovery, development, and deployment of advanced technologies and their potential impact on U.S. forces worldwide.
-
Provides risk assessments on the transfer and diversion of defense and dual-use U.S. technologies and assesses national security implications associated with foreign involvement in critical U.S. defense technology and defense sectors.
-
Produces intelligence for the U.S. National, Defense and Acquisition Communities. Conducts all-source analysis to identify, exploit, and assess potential threats, transfer, and vulnerabilities to defense supply chains.
-
Analyzes and assesses future technology and its military application(s) by foreign states and non-states.
-
Produces assessments projecting the discovery, development, and deployment of advanced technologies and the potential impact to Defense Critical Infrastructure and U.S. nuclear weapons worldwide.
-
Produces intelligence supporting the production of the National Security Threat Capabilities Assessment, and threat assessments / global baseline assessments for the Intelligence Community.
-
Conducts all-source analytic production of future and current leading-edge technologies and their military applications worldwide.
-
Projects the discovery, development, and deployment of advanced technologies and their potential impact on U.S. forces worldwide.
​
An additional 4 years of experience for a total of 7 years of experience may be substituted for a Bachelor’s degree.