POSITION SUMMARY: CACI is in search of a Cyber Intel Analyst with a wide range of knowledge, performs CI Cyber Operations support for duties to include policy, doctrine, cyber threat assessments, evaluation of CI Support to Cyber Operations concept of operations (CONOPS), vulnerability assessments, and other planning, staffing, and programmatic activities. RESPONSIBILTIES: Coordinates and synchronizes a broad range of CI Support to Cyber Operations activities. Reviews, evaluates, and provides insightful analysis to CI Support to Cyber Operations strategic plans and activities. Charts a strategic direction to analyze foreign activity on DoD systems. Delivers products that are timely, actionable and conducive to protection of critical information throughout the military branches by identifying and documenting foreign cyber capabilities, technologies and methodologies. May represents the customer at Joint, Intelligence Community and Inter-Agency Meetings worldwide as required. Independently develop initiatives to enhance the analysis and analytical support provided to CI Support to Cyber Operations capabilities Prepares and deliver briefings to senior leadership regarding CI Support to Cyber Operations. Provides client with a greater understanding of CI Support to Cyber Operations policies and methodologies. May liaise with the IA and the intelligence and law enforcement community. EDUCATION & EXPERIENCE: - BS/BA with 5 to 7 years experience. - Strong knowledge of general intelligence analysis principles governing the collection and evaluation of raw intelligence as well as the production and publication of finished intelligence - Strong knowledge of business intelligence and analytics, including supply chain risks - Strong knowledge of Cyber Threat Intelligence (CTI) principles to include indicators of compromise (IOC) types, indicator pivoting and indicator attribution strength. - Strong understanding of US Intelligence Community and how cyber intelligence organizations work together for purposes of conducting cyber threat analysis - Strong proficiency in report writing - Strong or Intermediate ability to apply formal intelligence analysis methods, develop hypothesis, prove/disprove relationships, always ask why, defend your analysis, and apply attribution to cyber threat activity. Candidate must be able to make confidence-based assessments for purposes of attribution based on their technical analysis of network traffic, multi-source data, malware and system forensic analysis. Candidate must be able to identify analytic bias. - Intermediate ability to present technical information and analysis to groups (Candidate will be required to brief up to 50 persons on a quarterly basis and smaller groups of up to 10 persons on a weekly basis) - Strong ability to conduct Incident Report Analysis on incidents reported under applicable DFARS procedures - Strong familiarity with the damage assessment process, specifically regarding data compromised as a result of adversary intrusions into contractor networks. - Strong ability to provide analysis supporting assessments of the overall impact of data loss on current and future USAF weapons programs, scientific and research projects, and warfighting capabilities (in accordance with guidance as set forth in AFI 33-200) - Self-starter with the ability to proactively engage and develop relationships with intrusion set subject matter experts and analyst counterparts across the US Intelligence and Law Enforcement communities - Familiarity with DoD Damage Assessment Management Office (DAMO) Program guiding documents and mission (DFARS Procedures, Guidance, and Information (PGI) 204.7303-4 DoD damage assessment activities) Desired Skills: - Formal training as an intelligence analyst in any discipline -“ graduate of US Govt intelligence analysis course: CAC, IBC, Kent School, IC 101, Analysis 101, Army, Navy, Air Force, etc - Certifications (any): CISSP, CEH, Security+, SANS certification(s), Network+, CCNA - Advanced Data Visualization proficiency leveraging COTS/GOTS tools - Any type of Cyber related Law Enforcement or Counterintelligence experience - Existing Subject Matter Expert of Advanced Persistent Threat activity - Analyst experience in a Federal Cyber Center or corporate computer incident response team . PHYSICAL DEMANDS: Normal demands associated with an office environment. Ability to work on computer for long periods and communicate with individuals by telephone, email and face to face. Some travel may be required.