Top Secret Clearance Jobs
Top Secret Clearance Jobs is hiring: OSINT DATA ANALYST (CSOC) in Triana
Top Secret Clearance Jobs, Triana, AL, US,
About the job OSINT DATA ANALYST (CSOC) Top Secret Clearance Jobs is dedicated to helping those with the most exclusive security clearance find their next career opportunity and get interviews within 48 hours. Quantum Research International, Inc. (Quantum ) is a certified DoD Contractor providing services and products to US/Alliedgovernments and industry in the following main areas: (1) Cybersecurity, High Performance Computing Systems, Cloud Services and Systems; (2) Space and Ground Support Systems; (3) Aviation Systems; (4) Missile Systems; (5) Artificial Intelligence/ Machine Learning Systems and Experimentation/Training; and (6) Audio Visual Systems and Services. Quantum's Corporate Office is in Huntsville, AL, but Quantum actively hires for positions nationwide and internationally. We pride ourselves on providing high quality support to the U.S. Government and our Nation's Warfighters. In addition to our corporate office, we have physical locations in Aberdeen; MD; Colorado Springs, CO; Orlando, FL; Crestview, FL; and Tupelo, MS. Quantum Research Intl is seeking an Open-Source Intelligence (OSINT) Data Analys t to conduct advanced analysis of open-source critical program information to support the Threat Systems Management Office (TSMO) mission and supporting U.S. Army agencies. An OSINT Data Analyst is responsible for gathering, analyzing, and interpreting publicly and commercially available information. The role involves the use of specialized tools and methodologies to extract valuable insights from large volumes of unstructured data. Responsibilities Data Collection: Identify and gather data from a wide range of open sources, including social media, websites, forums, news articles, and government databases. Utilize advanced search techniques, web scraping tools, and APIs to automate data collection processes. Stay updated on the latest sources of relevant information and technological advancements in OSINT tools and methodologies. Data Analysis: Process and analyze large datasets to identify trends, patterns, and anomalies. Use statistical and machine learning techniques to analyze and interpret data. Validate and cross-reference information from multiple sources to ensure accuracy and reliability. Digital Network Analysis: Monitor and analyze digital communications, including internet traffic, emails, and other network activities. Utilize specialized software and tools to collect, process, and analyze network data. Identify patterns, anomalies, and indicators of potential threats or targets within the digital network Data Interpreting and Reporting: Prepare detailed analytical reports, summaries, and visualizations to communicate findings to stakeholders. Interpret complex data sets and generate actionable intelligence reports. Collaborate with other intelligence analysts and teams to share insights and findings. Risk Assessment: Assess threats and risks related to cybersecurity, geopolitical developments, corporate security, or other areas of interest based on gathered intelligence. Provide actionable intelligence to support decision-making and strategic planning. Collaboration and Communication: Work closely with other analysts, investigators, and stakeholders to integrate OSINT findings with other intelligence sources. Participate in meetings and briefings to share insights and support collaborative intelligence efforts. Compliance and Ethical Standards: Ensure all OSINT activities comply with legal, ethical, and regulatory standards. Maintain a high level of confidentiality and integrity in handling sensitive information. Technical Proficiency: Maintain proficiency in digital network analysis tools, techniques, and methodologies. Stay informed about advancements in technology and digital communications. Participate in training and professional development opportunities to enhance technical skills. Requirements Bachelor's degree in computer science, data science, information systems, intelligence studies or other technically relevant degree. In lieu of degree, CFR, CySA, CISSP, Data, DataSys, Sec, GPEN, or PenTest may be accepted Proficiency in using OSINT tools (e.g., Maltego, SpiderFoot, Shodan) and web scraping techniques. Strong analytical skills with experience in data mining, machine learning, and statistical analysis. Competence in using visualization tools (e.g., Tableau, Power BI) to present data insights. Knowledge of Government standards for data security such as markings, handling of classified and unclassified information, and how to handle the distribution of this information Knowledge of computer networking concepts and protocols, and network security methodologies, risk management processes (e.g., methods for assessing and mitigating risk), and laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. Knowledge of cyber threats and vulnerabilities, and operational impacts of cybersecurity lapses. Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities. Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). TS/SCI eligible IAM or IAT Level Two. Desired/Preferred Skills Experience with adversary emulation, cyber protection team, red team, and vulnerability exploitation. Conducting vulnerability scans and recognizing vulnerabilities in security systems. Assessing the robustness of security systems and designs. Detecting host and network-based intrusions via intrusion detection technologies (e.g., Snort). Familiarity with programming languages like Python or R, especially for data analysis and automation tasks. Mimicking threat behaviors and the use of penetration testing tools and techniques. Using network analysis tools to identify vulnerabilities. (e.g., fuzzing, Nmap, etc.). Reviewing logs to identify evidence of past intrusions and conducting application vulnerability assessments. Conducting ethical hacking and penetration testing following established principles and techniques. Experience with active defense tools and programs Experience with using Jupyter Notebooks or working in LABBENCH environments ONSITE Equal Opportunity Employer: All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability, veteran status, genetic information, sexual orientation, gender identity, or any other characteristic protected by law. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.