SCD Journeyman Anaylst

Ft. Belvoir, VA
Consulting: Analytics & Operations


Analyze network traffic using a variety of tools and databases to identify anomalous or malicious activity being conducted on or against U.S. Government and Department of defense networks and systems. Develop knowledge of emerging threats posed to various systems, technologies, operations, or missions and the likely behavior of adversaries. Remain abreast of recently identified vulnerabilities and develop a method for detection of their exploitation prior to their use against U.S. and foreign networks. Perform each phase of cyber activity tracking; network reconnaissance to detect the presence of unexpected behavior, identify anomalous activity, categorize and tag malicious activity. Develop knowledge of adversary tactics, techniques and procedures, and attempt to draw associations with newly identified unattributed cyber activity. Identify and analyze indications of system compromise, determine level of severity and potential mission impact of anomalous behavior. Conduct Threat Hunting activities to identify initial attack vector and possible identification of threat actors. Provide recommendations for mitigation techniques to be employed across U.S. government systems. Assist in the evaluation and development of new tools and applications to improve organizational ability to identify and analyze malicious cyber activity. Conduct basic malware analysis to determine callbacks and associatedmalicious infrastructure and indicators.

-Ability to provide expert analysis and reporting in response to time sensitive requirements for support to Army and Intelligence community customers
-Ability to participate in reviews and assessments of current intelligence tools, processes, tactics, techniques, and procedures
-Ability to conduct network and deep-packet analysis to determine anomalous and malicious network behavior
-Familiarity with current and emergency cyber threats and methods used by malicious cyber actors
-TS/SCI clearance with a CI polygraph

-4-8 years of experience with IT in the SIGINT or intelligence community (IC) preferred
-Thorough knowledge of network technologies, ports and protocols
-Basic malware triage / analysis
-BS degree or 4 years of experience with related or equivalent formal military training, including SIGINT analysis and production at the tactical or strategic level
-One or more of the following certifications/knowledge preferred: Net+, Security+, Certified Ethical Hacker, or Penetration Tester or commensurate knowledge
Berico Technologies is an Equal Opportunity Employer of Minorities, Females, Protected Veterans, and Individual with Disabilities. We emphasize recruiting, hiring, and retaining the most qualified candidates and providing them with the opportunity to meet their potential.  We provide an environment where diversity leads to innovation.

Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information.