SENIOR INFORMATION SECURITY ANALYST/ SIGNATURE REDUCTION SUPPORT
The Contractor will provide dedicated assistance in the area of Signature Reduction Security Management. The contractor will provide one fully qualified and Signature Reduction Specialist.
Required Education:
|
Bachelor's Degree
|
Required Experience:
|
6 to 13 years
|
Required Security Clearance:
|
Top Secret SCI
|
|
|
Position Description
Intelligence Operations / Signature Reduction 3 - (TS/SCI with CI Poly) -
Basic Qualifications: The Signature Reduction Specialist will possess a minimum of three years experience working as a Signature Reduction Technician within DOD and have completed both the basic and advanced Joint Operational Support Training Courses (JOSTC).PREFERRED SKILLS AND EXPERIENCE:
The preferred candidate will possess Special Operations Forces experience with two years direct experience employing SIGREDUX methodologies, or former SOF support staff (Intel) with two years direct experience supporting SIGREDUX plans, requirements, policy directives, supporting documents, instructions, etc. .
Experience with Signature Reduction and surveillance reduction operations.
Experience conducting and/or supporting HUMINT or Counterintelligence similar operations.
Experience in Special Operations Forces, Intelligence, security and/or other specialized support Intelligence or Special Operations.
Oversee the team's intelligence products, including review of technical reports and other products developed by the team, prior to government review. Work on the assignment, prioritization, and review of identity exploitation under operations and conduct product and process review to ensure adherence to the SOP and applicable IS and USG regulations. Ensure assignments and requests for support are completed in a timely manner and reflect sound and accurate results, with proper classification. Participate in office and center priority meetings, prepare production briefings, and mentor junior contract staff on the creation of intelligence products, identify exploitation, and overall intelligence community issues. Provide feedback to the government, develop and maintain relationships with IC, LE, and biometrics community partners, and maintain awareness of IC, LE, and biometric efforts related to identity intelligence. Maintain a thorough understanding of all tools and systems being used for identity exploitation of biometric and non-biometric identity attributes and perform link analysis for identity attributes across NMEC holdings. Ensure the government lead is aware of exploitation findings, maintain awareness of DOMEX policies, including security classification guidelines, and display knowledge of current intelligence and biometrics databases.
JOB REQUIREMENTS:
· Coordinate with supported DoD and non-DoD agencies to formulate and implement effective strategies and mechanisms to reduce the signature of compromise to sensitive research and operations.
• When required, use signature reduction mechanisms in support of ongoing operations.
• Research and identify appropriate government and commercial entities to support signature reduction strategies in support of research and operations efforts.
• Conduct signature assessments and work with a team to incorporate signature reduction strategy into research and operations project plans.
• Monitor emerging operational requirements and operational capabilities and develop signature reduction strategies that meet changing operational environments.
• Coordinate with operational research and systems analysts to assess the effectiveness of operational signature reduction measures/program.
• Must possess the ability to develop plans, execute, assess, adjust, evaluate, and report with little supervision.
• Possess solid understanding of the military decision making process, and strong ability to articulate and brief senior leaders.
• Must be able to communicate effectively with customers and clearly present technical approaches and findings;
• Able to write/prepare operational orders, plans, mission support requests, field reports, etc, to include signature reduction plans.
• Must be computer literate and able to use standard office applications.
• Perform travel within CONUS as directed.
The Senior Information Security Engineer/Analyst is responsible for
various day-to-day security tasks in addition to larger information
security projects as part of supporting information security needs. Day-to-day tasks include cyber incident response, evaluation of requests for security changes, and automation of the monitoring of various security devices and audit logs. This also involves providing ongoing support and advice to IT staff and end users on a variety of security issues, and ensuring that security policy and procedures are adhered to.
Project work includes investigating, evaluating, and deploying security
solutions to meet Boston College's needs. The needs will be defined in
the context of an ongoing ISO 27002 security best practices
implementation. Project activities include attending meetings and
working with others to determine security requirements in order to
deploy appropriate solutions. This individual will be responsible for
developing and implementing new security policies and procedures, and
recommending strategies to prevent security breaches. Additional
responsibilities include reviewing and analyzing business risks together
with the creation of security requirements and controls. Will research,
analyze and utilize encryption, network security, forensic, GRC, and
other tools. Will identify and use various techniques to protect Boston
College's data with guidance from the Director of Policy and Security.
Requirements
*A BA or BS degree is required.
*At least 3 years of technical experience plus 3 to 5 years of
experience in Information Security is required.
*Strong technical knowledge in multiple domains of information security
including policy development, access control systems, telecommunications
network and Internet security, and legal and regulatory compliance.
*Strong project management and writing skills are also required.
*Knowledge of operating system security for servers and desktops, plus
network security and application security.
*Coding skills in C, Java, Python or PERL a plus.
*Must be able to work with and influence people at multiple levels
within a major university.
*Must be able to work independently and within a team oriented environment.