We provide significant value to our customers by proactively identifying national security threats via conducting in-depth analyses using government and public source datasets to identify and track terrorist and national security threats and provides intelligence on these threats to intelligence community partners.
Responsibilities:
Conduct research and data mining utilizing various classified and unclassified databases to acquire and assemble target information.
Create written threat assessments on individuals of interest to determine transportation credential eligibility
Conduct Open-Source research to collect and analyze publicly available information in response to requests for information from various law enforcement and intelligence units
Participate in weekly conferences with senior-level personnel to assess individuals of interest
Present oral briefings to government personnel regarding the analysis and assessment of potential threats to transportation and national security
Provide coordination and support as a unit liaison, advising costumers on classified intelligence information, target assessments, and unit requirements and procedures
#divergent
Possess more than eight (8) years of experience in the following areas below.
Expertise with information technology tools analyzing the deep web to determine transportation links.
All source intelligence analysis and writing in accordance with Intelligence Community Directives and standards.
Non attribution and mis-attribution concepts and techniques to provide operational security (OPSEC)
The government watch listing process to include, TIDE, the Terrorist Screening Database (TSDB), and DHS Watch listing mechanisms such as the Watch listing Framework (WLF)
Big data analytics to include ability to perform network analysis.
Ability to perform team lead/program management related duties such as tasking and summarization of work into material for executives and senior leaders.
Expert knowledge with identity resolution concepts and techniques
Expertise with vetting and security threat assessments of insider threats
Expertise in publicly available social media, the deep web, and other non-conventional data sources
Ability to independently produce written assessments, graphic representations (in Analyst's Notebook or like capability) of findings, source documentation, and summary briefings in response to tasking.
Understanding of laws, authorities, key policies, and procedures, as well as the privacy and intelligence oversight authorities and procedures
Proven ability to work effectively with personnel at all levels in a team environment and develop solutions to complex problems.
Minimum Education:
Clearance Required:
Preferred: