Bachelor's degree in a related specialized area or field or the equivalent is required plus a minimum of 5 years of relevant experience; or Master's degree plus a minimum of 3 years of relevant experience.
• BA/BS degree in Information Technology or Information Security, Computer Science, Intelligence analysis, Cyber Security or another related field of study or equivalent 3+ years performing cyber threat intelligence analysis.
• Candidate must have a strong all-source intelligence or counterintelligence background with 5+ years of experience serving in an analyst or agent role. Pertinent skills or experience include persona development, HUMINT targeting, support to law enforcement or counterintelligence investigations, Open Source Intelligence (OSINT) collection, Social Media/Social Networking analysis.
• Candidates must have a high proficiency with the Mandarin language. For non-native speakers, a DLPT (or equivalent test) score of R3/L3 or better within the last 4 years is required.
• Candidate must have knowledge of cyber terminology, tools, and concepts.
• Candidate must have a strong analytic writing ability and be able to provide a writing sample demonstrating the ability to produce and edit analytic products. Candidate must have at least 2 years of experience writing intelligence analysis products within the last 5 years. A technical writing sample and technical editing test will be required if the candidate has not previously authored published intelligence analysis products.
• Strong ability to apply formal intelligence analysis methods, develop hypotheses, prove/disprove relationships, always ask why, defend your analysis, and apply attribution to cyber threat activity. Candidate must be able to make confidence-based assessments and be able to identify analytic bias.
• Basic to intermediate technical skills proficiency in the following areas: network communication using TCP/IP protocols, basic system administration, basic understanding of malware (malware communication, installation, malware types), intermediate knowledge of computer network defense operations (proxy, firewall, IDS/IPS, router/switch, open source information collection. A Security+ certification or equivalent training will satisfy this.
• The candidate should have the ability to build intrusion related data visualizations and perform analysis (i.e., using I2 Analyst Notebook, Netviz, Palantir, etc).
• Strong understanding of US Intelligence Community and how cyber intelligence organizations work together.
• Strong ability to present information and analysis to groups up to 50 persons on a quarterly basis. Candidate will be required to brief smaller groups up to 10 persons on a weekly basis.
• Candidate must be a self-starter with the ability to proactively engage and develop relationships with subject matter experts and analyst counterparts across the US Intelligence and Law Enforcement communities.
• Experience building persona development products within the LE/CI or Intelligence Community
• Expertise in assessing sources using the PAMSSA method
• Formal training as an intelligence analyst in any discipline – graduate of USG intelligence analysis course: CAC, IBC, Kent School, IC 101, Analysis 101, Army, Navy, Air Force, etc
• Formal Law Enforcement/Counterintelligence training: i.e., FLETC, JCITA, etc.
• Experience applying Kill Chain analysis, Cyber Intelligence Preparation of the Environment (CIPE) modeling, or Diamond modeling of cyber threat activity
• Certifications (any): CISSP, CEH, Security+, SANS certification(s), Network+, CCNA
• Advanced NETFLOW and PCAP Analysis
• Advanced Data Visualization proficiency leveraging COTS/GOTS tools
• Technical Skills proficiency: encryption technologies/standards
• Intermediate malware analysis or digital computer forensics experience
• Any type of Cyber related Law Enforcement or Counterintelligence experience
• Existing Subject Matter Expert of Advanced Persistent Threat activity
• Experience using GOTS, COTS/Open Source tools: i.e., NOEISIS, Novetta Cyber Analytics, Mitre ChopShop and/or ARL DSHELL
• Analyst experience in Federal Cyber Center or Corporate CIRT
PREFERRED DEGREE TYPES AND EXPERIENCE:
18-22 years of professional experience without a degree; or 10-14 years of professional experience with a Bachelors degree from an accredited college in a related discipline, or equivalent experience/combined education; or 8-12 years of professional experience with a related Masters degree; or 4 years of professional experience required with a related PhD or JD
Department of Defense TS/SCI security clearance is required at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required.
General Dynamics Mission Systems has an immediate opening for a Chinese Mandarin Linguist Analyst (Senior). This position provides an opportunity to further advance the cutting-edge technology that supports some of our nation’s core defense/intelligence services and systems. General Dynamics Mission Systems employees work closely with esteemed customers to develop solutions that allow them to carry out high-stakes national security missions.
The selected candidate will serve as a Chinese Mandarin Linguist Analyst (Senior) with our customer in Linthicum, MD. The candidate will use their language skills to provide translation and analytic support in a team environment focused on cyber threat actors/activity. The candidate will author and review intelligence products by applying their linguistic skills, cultural knowledge and technical abilities. Additionally, the candidate will be expected to collaborate with analysts and agents from the FBI, various other Intelligence Community agencies, and the Defense Criminal Investigative Organizations (AFOSI, NCIS, CID, DCIS) on a regular basis. The candidate will rely heavily on their experience serving in past roles in Computer Network Operations, Law Enforcement/Counterintelligence, or Intelligence Community mission focused organizations. The selected candidate should be comfortable writing documents up to 60 pages in length.
Ideal candidate is an experienced cyber intelligence analyst or law enforcement/counterintelligence (LE/CI) analyst or agent, who has applied their mastery of cyber threat intelligence, intelligence analysis techniques, and sources and methods to produce high quality analysis products for the last 5 years.
General Dynamics Mission Systems (GDMS) engineers a diverse portfolio of high technology solutions, products and services that enable customers to successfully execute missions across all domains of operation. With a global team of 13,000+ top professionals, we partner with the best in industry to expand the bounds of innovation in the defense and scientific arenas. Given the nature of our work and who we are, we value trust, honesty, alignment and transparency. We offer highly competitive benefits and pride ourselves in being a great place to work with a shared sense of purpose. You will also enjoy a flexible work environment where contributions are recognized and rewarded. If who we are and what we do resonates with you, we invite you to join our high performance team!
General Dynamics is an Equal Opportunity/Affirmative Action Employer that is committed to hiring a diverse and talented workforce. EOE/Disability/Veteran