Cyber Analyst

Duty Description:
The Cyber Analyst plays a key role in developing the Cyber Warfare experimentation and analysis for Offensive Cyberspace Operations (OCO) and Defensive Cyberspace Operations (DCO) capabilities within the CBL for both live, virtual and constructive experimentation. The Cyber Analyst must be able to think strategically to develop future capabilities as well as provide solutions to current problems, based upon operational Cyber Warfare Experience through the use of both Table Top and Simulated Experiments. The Cyber Analyst must anticipate working in Commercial Networks as well as Military Tactical and Enterprise networks. Cyber Analysts will work closely with ACM-Cyber to inform, develop, and validate requirements within the JCIDS. The analysis conducted will be required to inform, develop, and validate requirements through experimentation independently or in coordination with ACM-Cyber. The Cyber Analyst will explore current Army CW posture, determine needs, assess risks, vulnerabilities, and recommend countermeasures. Cyber Analysts will employ a thorough understanding of the tenets of OCO and DCO, and know how to optimally use all Cyber resources for “effects-based” cyber warfare. Cyber Analysts will inform cyber capabilities that will deliver tactical, operational, and strategic advantages.


Requirements:
·     Security Clearance: TS with SCI eligibility.
·       Five (5) years’ exercise, experimentation, live prototyping or testing and evaluation experience or equivalent operating experience utilizing virtual and/or constructive models and simulations for the purposes of modeling and simulating Cyberspace mesh-network, or multi-echelon military forces experience. Preferred experience operating, maintaining and federating models and simulations with other models and simulations as well connecting model and simulation federations with Army Mission Command Information Systems (MCiS) or Joint Command and Control (C2) systems;
or
Provide verification of a minimum of two (2) years’ operational experience or equivalent conducting either offensive or defensive cyberspace operations with appropriate certifications such as penetration testing certification, cybersecurity certifications and attendance at DoD Cyberspace courses such as the Joint Network Analysis Course with collegiate education in computer science, electronic engineering or equivalent major, mesh-network planning and operations, or the operation of virtual or constructive models and simulations to support the modeling and simulation of tactical, operational and strategic military formations and their kinetic capabilities;
·       Five (5) years prior military experience and/or significant civilian occupational experience in Cyber Warfare including, but not exclusively, computer programming, software design, cyber security (defensive or offensive), and cyber forensics.
·       Be proficient in CISSP, Global Industrial Cyber Security Professional (GICSP), GIAC Enterprise Defender (GCED), GIAC Information Security Professional (GISP).
·       Four (4) years’ experience and understanding of Army force structure and force modernization efforts;
·       Four (4) years’ experience with tactical, operational and/or strategic Cyber planning.
·       Be computer literate with emphasis on proficiency with command line actions and the penetration and/or active defense of cyber architecture such as security scanning, penetration testing, patch management, and configuration management, and proficiency with the Linux operating system and MS Window operating system and associated Office products;
·       Possess advanced writing and presentation speaking skills.
·       Experience: five (5) years prior military experience and/or significant civilian occupational experience in Cyber Warfare including, but not exclusively, computer programming, software design, cyber security (defensive or offensive), and cyber forensics.
·       Proficiencies: CISSP, Global Industrial Cyber Security Professional (GICSP), GIAC Enterprise Defender (GCED), GIAC Information Security Professional (GISP).
·       Be computer literate with emphasis on proficiency with MS Office products (i.e.; MS Word, PowerPoint, Excel, and Access).
 

Summit Technologies, Inc. is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.
Position descriptions serve as a guideline and may not be construed as a guarantee of employment. Summit Technologies, Inc. is an at-will organization.

This position has been filled. Would you like to see our other open positions?