91 to 105 of 2,654
The Social Network Analyst conducts all source in depth link and social networks analysis using advanced analysis techniques; assesses opportunities to disrupt or degrade networks as appropriate; assesses information gaps and predicts areas of information that enhance the collection cycle, based on collection strategies and Requests for Information (RFIs). Additionally, t
Posted Today
The Analytic Methodologist (AM) supports the development of analytic strategies to resolve key intelligence questions of mission driven requirements; works with ambiguous information, deconstructs key questions, suggests methodologies, develops data schema to structured observations, and supports visualization of applicable data; identifies and evaluates a wide range of e
Posted Today
The Business Process Specialist (BPS) supports process improvement by conducting analysis using internal program and external benchmark data; determines areas of risk and improvement by developing/refining/monitoring metrics to create identification of and justification for improvements; conducts statistical analysis to measure production, performance, and usage of servic
Posted Today
The Senior Cyber Analyst researches commercial state and non state cyber programs and capabilities including development, tactics, and operational activities; develop insights into the components, structures, use and vulnerabilities of information systems; and develops and implements research and process improvements in collaboration with Government leadership. Qualificat
Posted Today
The Business Process Specialist (BPS) supports process improvement by conducting analysis using internal program and external benchmark data; determines areas of risk and improvement by developing/refining/monitoring metrics to create identification of and justification for improvements; conducts statistical analysis to measure production, performance, and usage of servic
Posted Today
The Cyber Analyst researches commercial state and non state cyber programs and capabilities including development, tactics, and operational activities; develop insights into the components, structures, use and vulnerabilities of information systems; and develops and implements research and process improvements in collaboration with Government leadership. Qualifications Ac
Posted Today
The All Source Analyst conducts analysis using intelligence and information from multiple sources to assess, interpret, forecast, and explain a range of national security issues and developments that are regional or functional in nature; provides all source analytic support to collections, operations, investigations, and other defense intelligence analytic requirements; r
Posted Today
The OSINT Analyst conducts analysis and produces products on enemy capabilities and intent to understand customer mission; establishes and maintains persistent monitoring to assess open source data; evaluates and reports on open source information about data spills, breaches, emerging capabilities, compromises, threats, and vulnerabilities; and analyzes and documents iden
Posted Today
The Social Network Analyst conducts all source in depth link and social networks analysis using advanced analysis techniques; assesses opportunities to disrupt or degrade networks as appropriate; assesses information gaps and predicts areas of information that enhance the collection cycle, based on collection strategies and Requests for Information (RFIs). Additionally, t
Posted Today
The Data Scientist conducts data analytics, data engineering, data mining, exploratory analysis, predictive analysis, and statistical analysis, and uses scientific techniques to correlate data into graphical, written, visual, and verbal narrative products, enabling more informed analytic decisions. The Data Scientist proactively retrieves information from various sources,
Posted Today
The Data Scientist conducts data analytics, data engineering, data mining, exploratory analysis, predictive analysis, and statistical analysis, and uses scientific techniques to correlate data into graphical, written, visual, and verbal narrative products, enabling more informed analytic decisions. The Data Scientist proactively retrieves information from various sources,
Posted Today
The Threat Finance Analyst (TFA) conducts all source forensic accounting analysis and production by fusing financial/transactional data from formal banking systems, financial reports, and other forms of reporting; analyzes specific foreign financial activities including threat financiers, facilitators, and financial networks/operations associated with, but not limited to,
Posted Today
The Technology Analyst conducts all source analytic production of future and current leading edge technologies and their military applications worldwide; projects the discovery, development, and deployment of advanced technologies and their potential impact on U.S. forces worldwide; provides risk assessments on the transfer and diversion of defense and dual use U.S. techn
Posted Today
The Technology Analyst conducts all source analytic production of future and current leading edge technologies and their military applications worldwide; projects the discovery, development, and deployment of advanced technologies and their potential impact on U.S. forces worldwide; provides risk assessments on the transfer and diversion of defense and dual use U.S. techn
Posted Today
The Counter Intelligence (CI) Specialist identifies, monitors, and assesses foreign intelligence efforts attempting collection of sensitive national security information on U.S. persons, activities, and interests, including threats posed by emerging technologies to U.S. operations and interests. The CI Specialist applies understanding of foreign intelligence capabilities/
Posted Today
Email this Job to Yourself or a Friend
Indicates required fields