All Source Intel Analysis

Founded in 1989, CALNET, Inc. is a privately held company in the Technology, Intelligence Analysis, and Language Services consulting arena. Headquartered in Reston, VA and with a branch office in San Diego, CALNET employees deliver true value to our customers by employing best practices, world class technologies industry expertise in every project. CALNET is an ISO 9001, ISO 20000, CMMI-Level III and ISO 27001:2013 certified. We are currently searching for a talented, professional "All Source Intel Analysis" in Fort Huachuca, AZ. We are looking for a candidate with Information Technology (IT) services background for a US Army Regional Cyber Center - Continental United States (USARCC-C) contract. US Army Cyber Command (ARCYBER) serves as the Army Service Component Command to USCYBERCOM for Cyberspace Operations and is under Tactical Control (TACON) to Joint Forces Headquarters Department of the Defense Information Network (JFHQ-DoDIN) for DoDIN Operations and Defensive Cyberspace Operations (DCO). ARCYBER is the primary Army headquarters responsible for cyberspace operations in support of Army and Joint requirements and serves as the single point of contact for reporting and assessing Army cyberspace incidents, events and operations in Army networks, and for synchronizing and integrating Army responses thereto. Responsibilities: Provide crisis response and mitigation techniques to deny further exploitation by the adversary; synchronize and integrate intelligence activities in order to detect, analyze and recommend mitigation of cyberspace threats and vulnerabilities. Provide written input to daily, weekly, and ad hoc requirements to appraise intelligence issues, coordination efforts, and future plans. Perform technical analysis or computer network intrusion events and malicious activity in support of cyberspace intelligence efforts. Analyze trends and statistics of cyberspace activity to provide proactive indications and warnings of malicious cyberspace activity. Perform filter queries of network flow data and analyze results for anomalies and malicious indicators. Analyze the origins, pathways, and methodologies of malicious cyberspace activities to attribute, model and predict future intrusions. Analyze computer network intrusion events and malicious activity to support intrusion detection and cyberspace-attack warning. Provide recommendations for appropriate actions in order to mitigate vulnerabilities, correct faults, and defeat or defend against threat activity. Required Skills: Minimum 5 years demonstrated/practical hands-on experience performing incident handling in a DOD network environment. Familiar with producing product such as Intelligence Estimates, Cyber Threat Reports, Network Activity Reports, Adversary Tactics Manual, and Intelligence Summary (INTSUM). CNDSP Analyst - (one of the following CEH, CSA+, CISA, or CSNA) IAT Level III - (Any one of the following: CASP CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH) Security+CE ITIL v3 Foundation Certification Education: BS degree in Engineering, Computer Science, Mathematics, or Science. (MSpreferred) JC1276
Salary Range: NA
Minimum Qualification
5 - 7 years

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.