The Ops Integration Analyst – Intelligence will coordinate and lead interaction with Title 50 stakeholders. The successful candidate will be responsible for supporting the research and development of a rapid prototyping platform, coordinating Computer Network Operations (CNO) through advanced software applications to interactively counter emerging threats to the customer’s cybersecurity interests, and capturing feedback for program analysis and validation. Provide de-confliction and reach- back support for operational users during beta testing, including but not limited to Defense Industrial Base (DIB) security and program personnel, DoD and US Gov’t Counterintelligence and Security agencies, DoD Cyber Operations units, acquisitions offices, and intelligence agencies. In anticipation of operations, provide ongoing process evaluation, systematic assessment, and feedback to the R&D team for prototyping and CONOPS refinement by collecting, analyzing and using process data in order to determine effectiveness of the CONOPS and investigate whether it has been implemented successfully.
Identify how interrelated processes within the program have been implemented, to include personnel involved in the implementation, resources used, problems experienced during the implementation; and provide feedback for CONOPS refinement and R&D prototyping as needed
In preparation for operational use, conduct assessment of stakeholders and processes concerned with the project; respective process requirements; and make recommendations for measurements of efficiency to determine stakeholder satisfaction
Analyzes information and documentation from various sources associated with the operational and administrative functions of various DoD and USG departments/agencies and provides guidance and support to management regarding integration with CONOPS
Establishes and maintains relationships with operational users in order to generate improved response and information sharing capabilities
Reviewing operational user requirements and taking appropriate steps to ensure successful delivery of technical capabilities
Maintain working knowledge of cyber threat actor tactics, techniques and procedures
Research, gather, and interpret cybersecurity information from operational users to identify inefficiencies, make appropriate recommendations, create solutions, etc.
Provide Subject Matter Expertise (SME) advise and support to planning/developmental forums and working groups as appropriate
Provide evaluation and feedback necessary for improving operational use, intelligence reporting and collection requirements when appropriate
Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations
Report intelligence-derived significant events resulting from operational use
Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up-to-date.
Develop a deep understanding of operational risks and drive the response process to minimize the impact of these risks
Minimum Bachelor's degree, with preference in one of the following fields or related studies:
Seven years of experience in one of the following fields:
Counterintelligence – Cyber CI, Offensive CI, or CI support to Research, Development and Acquisitions
DoD Cyber Operations
Operational Security or Military Deception
Must possess a broad knowledge of cyberspace capabilities availability and understanding of available infrastructure or platforms.
Demonstrate an understanding of information security beyond simple terminology and concepts through one or more industry recognized network security certifications (any): CISSP, CEH, GCIH, Network+, Security+, A+, CCNA or similar industry recognized certifications
Familiarity with the US government Cyber Centers and their associated mission areas
Knowledge of adversary activities in cyberspace with an understanding of intrusion set tactics, techniques, and procedures (TTP)
Familiarity with Advanced Persistent Threat (APT) activity as well as indicators of compromise
Ability to analyze cyber threat products that assist in identifying threats, priorities, severities, and IA risk mitigation measures
Ability to perform data analysis, aggregation, event correlation and information security threat definition
Ability to engage with cyber intelligence analyst across the DoD and USG communities
Ability to work effectively in a fast-paced environment with competing priorities
Strong interpersonal skills
Must possess TOP SECRET clearance at time of hire, with SCI eligibility
This position description is not an active opening but is representative of positions within CACI that are consistently available. Individuals who apply may also be considered for other positions at CACI.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 55 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.