DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Jobs

Cyber Analyst

XOR Security

Reading Time: 3 mins read
in Jobs

 

Job Description: 

XOR Security is currently seeking talented Cyber Analyst supporting our client at Linthicum Heights MD. Our premier clients within the Department of Defense for the Defense Cyber Crimes Center DC3). The DC3 program provides comprehensive Forensic, Malware Analysis, and Reverse Engineering support across the Defense enterprise by providing deep analysis of potential threat activity targeting critical DoD assets.

 

Details:

  • Serve as the technical intelligence expert and consultant on threat support to the Air Force Cyber Resiliency Office for Weapon Systems (CROWS).
  • Present Intelligence Community and Acquisition Intelligence threat assessments to a variety of senior executive and flag officer decision making bodies.
  • Serve as an Acquisition Intelligence and CRSG, CROWS, and CCP technical intelligence authority.
  • Serve as an all-source technical intelligence expert.
  • Knowledge of acquisition policy and guidance and the role intelligence plays throughout a weapons system’s lifecycle; Acquisition Intelligence analysis mission and strategy; and the roles and responsibilities of field intelligence offices in support of USAF research laboratories, acquisition program offices, and life-cycle management, nuclear, sustainment, and system testing enterprises. Knowledge and expertise in USAF and USSF system components (hardware, software, firmware) and how each subsystem interrelates to enable mission capability OR an avionics communications background.
  • Understands the integration and interoperability of sensors, navigational aids, and other onboard digital subsystems. Has working knowledge of air, space, and ground data and voice links used by USAF, USSF, other DoD departments and coalition allies. Has working knowledge of offboard support equipment (maintenance aids, test equipment, etc). Has basic knowledge of the usage and implementation of common cryptographic equipment and standards.
  • Knowledge of a comprehensive range of intelligence research methods, techniques, and practices and advanced analytical principles, concepts, and methods used to identify and analyze complex multi-source technical intelligence information to produce detailed intelligence capabilities and cyber threat assessments, identify cyber related intelligence deficiencies, and advocate for customer’s cybersecurity requirements.
  • Skill in conducting unbiased complex research, identifying appropriate available systems/data sources, and producing intelligence requirement assessments that answer specific tasks to link and leverage agency capabilities in support of customers’ cyber threat and cyber risk management needs.
  • Skill in communicating clearly, concisely, and with technical accuracy, orally and in writing, as well as work in a professional manner with peers, management, subordinates, contractors, academia, and other agencies to work out solutions to problems, prepare professional level documents and studies, and deliver General Officer (executive) level information and decision briefs. Ability to quickly assimilate disparate data, render knowledgeable and accurate assessments of the implication of such data, and make decisions, estimates, and recommendations under conditions of urgency and competing resource, based on mature judgment and experience and present and/or defend a position effectively.

US Located Required:  Yes

Location: Linthicum Heights, MD

Schedule: Full time

Clearance Requirement: Top Secret/SCI

 

Apply Now

Tags: ClearanceCyber AnalystIn PersonJobsLinthicum HeightsMarylandSenior PositionUnited StatesXOR Security
ADVERTISEMENT

Related Posts

Dark Wolf Solutions – Blue Team Lead, Cybersecurity Advisor

Dark Wolf Solutions – Blue Team Lead, Cybersecurity Advisor

January 12, 2023
XOR Security – Cyber Hunt/Deception Operations SME

XOR Security – Cyber Hunt/Deception Operations SME

January 12, 2023
Palo Alto Networks – Principal Solutions Architect, SASE/ Zero Trust

Palo Alto Networks – Principal Solutions Architect, SASE/ Zero Trust

January 12, 2023
ITW – IT Security Analyst

ITW – IT Security Analyst

January 12, 2023

More Articles

Alerts

Spain’s Ministry of Labor and Social Economy hit by cyberattack

June 11, 2021

Astroturfing

November 17, 2021
Alerts

Spider-Man Fans Warned About Scams Leveraging New Movie

December 17, 2021
Incidents

Nvidia Investigating Potential Cyberattack

February 28, 2022
Tool

Huawei – Tools

March 16, 2022

Olympus US was forced to take down computer systems due to cyberattack

October 12, 2021
Course

Python 3 For Offensive PenTest: A Complete Practical Course

April 20, 2022
Incidents

Crooks steal NFTs worth ‘$3m’ in Bored Ape Yacht Club heist

April 26, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.