Your Impact:
Provides significant value to our customers by proactively identifying national security threats via conducting in-depth analyses using government and public source datasets to identify and track terrorist and national security threats and provides intelligence on these threats to intelligence community partners.
Responsibilities:
Analysts will provide information that helps keep individuals and their supporters, who may pose threats to national security, out of the U.S. or that leads to their removal, detention, prosecution, or other legal action by conducting bulk and targeted intelligence and data analyses.
Intelligence Analysis support includes:
Bulk Intelligence analysis - processing large volume intelligence data
Proactive - ongoing and ad hoc initiatives that are created by analytical units and which seek to address identified gaps and specific threats through large-volume analysis.
Reactive - analysis performed in large volumes at the request of the customer.
Targeted Intelligence analysis - provide in-depth analysis of individuals and entities
Proactive - ongoing and ad hoc initiatives that are created by analytical units and which seek to address identified gaps and specific threats; address individual or smaller threat areas.
Reactive - analysis performed on individuals or smaller threat areas at the request of the customer.
#Divergent #EVC
Requirements:
Intelligence Analyst 1 responsibilities may include, but are not limited to the following:
Selects, abstracts, or excerpts data from specific sources and compiles them
Evaluate and make preliminary analyses of raw intelligence data in items of such factors as the adequacy of detail and coverage
Maintains files of raw or abstracted data
Provides services that seek, capture, consolidate, and synthesize locally relevant data to create and maintain baseline domain awareness for the organization’s area of responsibility, including observing and reporting potential threat components, indicators, vulnerabilities, and domain intelligence gaps
Develops and maintains source identification products
Receives and analyzes information assessing office collection capabilities against the organization’s priority criminal and national security threats, indicators, and/or gaps
Clearance Required: Top Secret
Degree: Experience EquivalenceBachelors: Associate Degree +2 years of relevant experience, or 4 years of relevant experienceMasters: Bachelors Degree +2 years of relevant experience, or Associate Degree +4 years of relevant experienceMinimum Years of Experience: 6 years RELEVANT experience (with no degree)
...years of experience Preferred Qualifications ~4+ years developing firmware/embedded software for a variety of system on chips (AMD Zynq preferred)~ C/C++ (14 and above) OOPs-based application development on embedded real time systems ~ FreeRTOS or equivalent...
...capabilities and to predict and evaluate their performance. Job Description: The Communications and Networks Systems Design Engineer will actively participate in the design, analysis, and implementation of novel algorithms and protocols at all layers of the network...
...Current skill set are reviewed every other year, new skills may be required to meet changing business needs.) IMS DB2 Oracle and Teradata Databases Data Warehousing COBAL Visual Basic C C++ SAS Java/JavaScript Framework PEGA CSS3 Mobile JSON Cognos Hadoop SQL J2EE HTML...
...Job Description Delivery Driver Job Description This is for our 686 Roosevelt Rd, Glen Ellyn, IL 60137 Want daily cash in... ...have fun at work, have opportunities to grow and walk out every night with cash in your pockets! See below to make sure you qualify:...
...General Summary of Position: We are looking for an experienced Salesforce Developer to join our team. In this role, you will be responsible for designing, developing, and implementing customized solutions within the Salesforce platform to support critical business...