Cyber Intel Analyst STF Job Description
Cyber Intel Analyst STF Duties & Responsibilities
To write an effective cyber intel analyst STF job description, begin by listing detailed duties, responsibilities and expectations. We have included cyber intel analyst STF job description templates that you can modify and use.
Sample responsibilities for this position include:
Cyber Intel Analyst STF Qualifications
Qualifications for a job description may include education, certification, and experience.
Licensing or Certifications for Cyber Intel Analyst STF
List any licenses or certifications required by the position: IAT, SANS, CISSP, CEH, IAM, GGCIH/GCFA, GIAC, CCNA, SSL, TS/SCI
Education for Cyber Intel Analyst STF
Typically a job would require a certain level of education.
Employers hiring for the cyber intel analyst STF job most commonly would prefer for their future employee to have a relevant degree such as Bachelor's and Collage Degree in Education, Technical, Information Technology, Intelligence, Information Security, Computer Science, Cyber Security, Professional Development, Writing, English
Skills for Cyber Intel Analyst STF
Desired skills for cyber intel analyst STF include:
Desired experience for cyber intel analyst STF includes:
Cyber Intel Analyst STF Examples
Cyber Intel Analyst STF Job Description
- Comprehensive understanding of Security Methodologies, firewalls, proxies, mail servers, and web servers
- Highly exceptional verbal and written communication skills, including ability to produce provide expert review of accurate and timely technical reports are required of material for release to a larger community
- Demonstrated in-depth understanding of Mac OS internals, low-level systems development, and APIs
- In-depth understanding of Linux operating system
- Demonstrated experience in low-level systems development for Linux and Windows
- Experience with Joint targeting and coursework preferred
- BA/BS degree in Information Technology or Information Security, Computer Science, Intelligence Studies, Cyber Security or another related field of study or equivalent 3+ years performing technical cyber threat and/or all-source intelligence analysis
- Must have an active required security clearance
- Experienced in C, C++, Linux
- Vulnerability Research Process, Vulnerability techniques
- VR Tools (IDAPro, WinDbg, Wireshark, Peach Fuzzer, JTAG, gdb, BinaryNinja, RADAR2, binwalk)
- Embedded Computer System Architectures