Insider Threat System Analysts employ complex data analytics tools, develop and oversee software programs to collect information from Agency computer networks, and conduct data analysis to identify anomalies and support counterintelligence, security, administrative, and criminal investigations.
Develops software programs to support User Activity Monitoring (UAM) efforts on NGA networks, utilize complex tools and mathematical algorithms to develop data analytics tools (i.e. Risk 360), and conduct analysis of information to identify unusual patterns and other indications of insider threat activity. Assimilate, evaluate and interpret all-source information involving counterintelligence threats, security issues, computer misuse, and personnel misconduct to identify threats against NGA personnel, programs, information systems and/or facilities. Knowledgeable of cyber security, computer network defense, and investigative and law enforcement activities. Advise customers on issues regarding full life cycle of data from design to production to maintenance, and including conversion, migration, translation, and data quality assurance. Assures that database information can be shared, understood, accessed and is accurate. Assess customer requirements, evaluate alternatives, and develop recommendations. Conducts design and development of software, determination of interfaces, and technical feasibility analysis. Coordinates and performs requirements and implementation analysis, design, development, testing and enhancement of application software.
YOU HAVE
Experience with analytical problem solving and familiar with conducting operations relating to insider threat, counterintelligence investigations, and counterespionage.
Working knowledge of Intelligence regulations and Intelligence oversight principles and understanding of geospatial-intelligence products, capabilities, and missions.
Publishes finished analysis. Knowledge of DoD/Intelligence/law enforcement communities.
Knowledge of general administration of computerized databases, developing long-range requirements for database administration and design, preparing activity and progress reports regarding the database
3-6 years relevant experience
Bachelor's in a related field or equivalent experience
Top Secret SCI w/Polygraph
Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran's status, ancestry, sexual orientation, gender identity, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal EEO laws and supplemental language at EEO including Disability/Protected Veterans (https://www.dol.gov/agencies/ofccp/posters) and Labor Laws Posters (https://protect-us.mimecast.com/s/MI5TC2kqOqsOBPMVfnZ32U) .
S:SKCYB-CYBER-THREAT SKCYB