To produce, per analyst on average, 36 weekly threat reports, 8 monthly threat reports, three quarterly threat reports, and one annual threat study for each specific focus or area. In addition, each analyst will average 6 reports of inquiry (ROI) and or requests for information (RFI) and publish or contribute to nine Intelligence Information Reports (IIR) annually. Finally, each analyst will produce, on average, 48 weekly status reports. Reports will conform to the information below.
Duties May Include:
- Produce weekly actionable cyber CI cyber threat reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary.
- Produce monthly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary.
- Produce quarterly cyber CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary.
- Produce annual cyber CI threat studies in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Annual threat studies are based on the fiscal year timeline.
- Produce CI Information Reports on an as needed/required basis. Produce IIRs from data collected and reported by either the cyber CI team or the NGA cyber security personnel.
- Perform inquiries of anomalous activity using cyber or related automated investigative tools (using most, if not all of the following: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE and Proton).
- Provide cyber CI advice and expertise in support of CI inquiries, operations and issues.
- Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.
- Conduct research, evaluate collection, and perform analysis on cyber intelligence topics of interest to SIC leadership, analysts and customers.
- Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner.
- Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.
- Demonstrate current subject matter expertise on cyber issues, threats and trends.
- Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.
- Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.
- Display an ability to collaborate with internal NGA and external IC/Cyber community members.