*This position is contingent upon contract award *
Insider Threat System Analysts employ complex data analytics tools, develop and oversee software programs to collect information from Agency computer networks, and conduct data analysis to identify anomalies and support counterintelligence, security, administrative, and criminal investigations. They develop software programs to support User Activity Monitoring (UAM) efforts on NGA networks, utilize complex tools and mathematical algorithms to develop data analytics tools (i.e. Risk 360), and conduct analysis of information to identify unusual patterns and other indications of insider threat activity. They assimilate, evaluate and interpret all-source information involving counterintelligence threats, security issues, computer misuse, and personnel misconduct to identify threats against NGA personnel, programs, information systems and/or facilities. They are knowledgeable on cyber security, computer network defense, and investigative and law enforcement activities. Analysts advise customers on issues regarding full life cycle of data from design to production to maintenance, and including conversion, migration, translation, and data quality assurance. Assures that database information can be shared, understood, accessed and is accurate. Assess customer requirements, evaluate alternatives, and develop recommendations. Conducts design and development of software, determination of interfaces, and technical feasibility analysis. Coordinates and performs requirements and implementation analysis, design, development, testing and enhancement of application software.
Required Skills/Experience
Bachelors an 3+ years experience (4 additional years experience in lieu of degree)
Experience with analytical problem solving and familiar with conducting operations relating to insider threat, counterintelligence investigations, and counterespionage.
Working knowledge of Intelligence regulations and Intelligence oversight principles and understanding of geospatial-intelligence products, capabilities, and missions.
Publishes finished analysis. Knowledge of DoD/Intelligence/law enforcement communities.
Knowledge of general administration of computerized databases, developing long-range requirements for database administration and design, preparing activity and progress reports regarding the database management.
Experience working on most phases of applications programming activities, with limited instruction.
Must posess an active U.S. Government issued TS/SCI clearance
Desired Skills/Experience
Possess superior writing and briefing skills and publish finished analysis.
Credentialed from a recognized counterintelligence training school or formal analysis training program is desired.
Experience leading development and maintenance of databases and/or database applications.
Experience maintaining database dictionaries and integration of systems through database design.
Experience developing, modifying or configuring moderately complex software applications from detailed specifications.
Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran's status, ancestry, sexual orientation, gender identity, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal EEO laws and supplemental language at EEO including Disability/Protected Veterans (https://www.dol.gov/agencies/ofccp/posters) and Labor Laws Posters (https://protect-us.mimecast.com/s/MI5TC2kqOqsOBPMVfnZ32U) .
S:SKCYB-CYBER-THREAT SKCYB