Know ATS Score
CV/Résumé Score
  • Expertini Resume Scoring: Our Semantic Matching Algorithm evaluates your CV/Résumé before you apply for this job role: CI Cyber Threat Analyst.
United States Jobs Expertini

Urgent! CI Cyber Threat Analyst Job Opening In Springfield – Now Hiring General Dynamics Information Technology

CI Cyber Threat Analyst



Job description

Seize your opportunity to make a personal impact as a CI Cyber Threat Analyst supporting our intelligence customer.

GDIT is your place to make meaningful contributions to challenging projects and grow a rewarding career.

At GDIT, people are our differentiator.

As CI Cyber Threat Analyst, you will help ensure today is safe and tomorrow is smarter.

Our work depends on a TS/SCI level cleared CI Cyber Threat Analyst joining our team to support our customer.

Duties & Responsibilities

  • Produce weekly actionable Technical CI (Cyber) status reports in collaboration with teammates, the customers partners and intelligence community peers, as necessary.

    Provide relevant input for the CI Cyber Branch to create 36 weekly cyber status reports, each report due NLT each Monday morning.

    Status reports will include (as applicable):Threat data collected and reported by the customers Technical CI team and network security personnel.Intelligence reported by the Intelligence Community.Fusion of all source threat analysis derived from multiple intelligence sources (INTs).Imagery when available.Information that can be used to inform security decisions.
  • Produce monthly Technical CI threat reports in collaboration with teammates, the customer’s partners and Intelligence Community peers as necessary.

    Provide a monthly threat report for the months not falling on the quarterly report month or the annual report month.

    Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month.

    Threat reports should include:Compilation of data collected and reported in weekly products.Intelligence reported by the Intelligence Community.Fused All Source threat analysis derived from multiple INTs.Imagery when available.
  • - Depiction of Technical CI threat (s) to inform security decision makers.

  • Produce quarterly Technical CI threat reports in collaboration with teammates, the customers partners and Intelligence Community peers as necessary.

    Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July.

    Threat reports should include:Compilation of data collected and reported in weekly and monthly products.Intelligence reported by the Intelligence Community.Fused all source threat analysis derived from multiple INTs.Include imagery when available.Depiction of Technical CI threat (s) to the customer to inform security decisions.
  • Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, customer’s partners and Intelligence Community peers as necessary.

    The annual Cyber Threat Assessment is due NLT 1 1 December.

    Threat studies should include:Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products.Raw and finished Intelligence reported by the Intelligence Community.Fused all source threat analysis derived from multiple INTs.Include imagery when available.Analytic judgments, intelligence gaps, and overall technical threat(s) to the customer.
  • Produce IIRs from data collected and reported by either the Technical CI team, the customer’s cyber security personnel, or partner agencies.

    Provide a minimum of 9 IIRs within Fiscal year.

    Effective IIR writing requires:Coordination with teammates and stakeholders to ensure accuracy of reported information.Cross referencing local information reporting with Intelligence Community reporting.Clear and concise writing to briefly convey threat.Responsiveness to Intelligence Community priority collections requirements.Timeliness.Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE or Criss Cross).
  • Provide Technical CI advice and expertise in support of CI inquiries, operations and issues.
  • Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners.
  • Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers.
  • Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner.
  • Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages.
  • Demonstrate current subject matter expertise on Technical CI issues, threats and trends.

    (For example: Cyber threats and Technical Surveillance threats.)
  • Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards.
  • Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing.
  • Display an ability to collaborate internally and externally with IC/Cyber community members.
  • Coordinate CI Cyber activities originating from Enterprise Incident Response Events.
  • Conduct liaison between CI Office, Insider Threat, Cyber Security Operations Center (CSOC), other customer Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission.
  • Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures.
  • Skills and Experience:

    Required:

  • 11+ years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations.
  • Meet minimum training requirements, within one calendar year of assignment, for access to DoD networks in accordance with DoDM .03, by attaining and maintaining at least baseline certification for DoDM .03 Information Assurance Technician Level II compliance.
  • Desired:

  • Be a credentialed graduate of an accredited federal or DoD CI training academy.
  • Possess a Bachelor’s degree in Science, Technology, Engineering or Mathematics disciplines.
  • Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines.
  • Possess knowledge and understanding of foreign adversaries’ security and intelligence services, terrorist organizations, and threats posed to US Gov.
  • Experience translating Government vision into understandable and achievable measures.
  • Experience in using supervisory skills to coach teammates to achieve objectives
  • Monitor and track progress towards achievable measures.
  • Location: Customer Site

    Clearance: Active TS/SCI with ability to obtain CI Poly

    US Citizenship Required


    Required Skill Profession

    Computer Occupations



    Your Complete Job Search Toolkit

    ✨ Smart • Intelligent • Private • Secure

    Start Using Our Tools

    Join thousands of professionals who've advanced their careers with our platform

    Rate or Report This Job
    If you feel this job is inaccurate or spam kindly report to us using below form.
    Please Note: This is NOT a job application form.


      Unlock Your CI Cyber Potential: Insight & Career Growth Guide


    • Real-time CI Cyber Jobs Trends in Springfield, United States (Graphical Representation)

      Explore profound insights with Expertini's real-time, in-depth analysis, showcased through the graph below. This graph displays the job market trends for CI Cyber in Springfield, United States using a bar chart to represent the number of jobs available and a trend line to illustrate the trend over time. Specifically, the graph shows 7538 jobs in United States and 126 jobs in Springfield. This comprehensive analysis highlights market share and opportunities for professionals in CI Cyber roles. These dynamic trends provide a better understanding of the job market landscape in these regions.

    • Are You Looking for CI Cyber Threat Analyst Job?

      Great news! is currently hiring and seeking a CI Cyber Threat Analyst to join their team. Feel free to download the job details.

      Wait no longer! Are you also interested in exploring similar jobs? Search now: .

    • The Work Culture

      An organization's rules and standards set how people should be treated in the office and how different situations should be handled. The work culture at General Dynamics Information Technology adheres to the cultural norms as outlined by Expertini.

      The fundamental ethical values are:
      • 1. Independence
      • 2. Loyalty
      • 3. Impartiality
      • 4. Integrity
      • 5. Accountability
      • 6. Respect for human rights
      • 7. Obeying United States laws and regulations
    • What Is the Average Salary Range for CI Cyber Threat Analyst Positions?

      The average salary range for a varies, but the pay scale is rated "Standard" in Springfield. Salary levels may vary depending on your industry, experience, and skills. It's essential to research and negotiate effectively. We advise reading the full job specification before proceeding with the application to understand the salary package.

    • What Are the Key Qualifications for CI Cyber Threat Analyst?

      Key qualifications for CI Cyber Threat Analyst typically include Computer Occupations and a list of qualifications and expertise as mentioned in the job specification. Be sure to check the specific job listing for detailed requirements and qualifications.

    • How Can I Improve My Chances of Getting Hired for CI Cyber Threat Analyst?

      To improve your chances of getting hired for CI Cyber Threat Analyst, consider enhancing your skills. Check your CV/Résumé Score with our free Tool. We have an in-built Resume Scoring tool that gives you the matching score for each job based on your CV/Résumé once it is uploaded. This can help you align your CV/Résumé according to the job requirements and enhance your skills if needed.

    • Interview Tips for CI Cyber Threat Analyst Job Success
      General Dynamics Information Technology interview tips for CI Cyber Threat Analyst

      Here are some tips to help you prepare for and ace your job interview:

      Before the Interview:
      • Research: Learn about the General Dynamics Information Technology's mission, values, products, and the specific job requirements and get further information about
      • Other Openings
      • Practice: Prepare answers to common interview questions and rehearse using the STAR method (Situation, Task, Action, Result) to showcase your skills and experiences.
      • Dress Professionally: Choose attire appropriate for the company culture.
      • Prepare Questions: Show your interest by having thoughtful questions for the interviewer.
      • Plan Your Commute: Allow ample time to arrive on time and avoid feeling rushed.
      During the Interview:
      • Be Punctual: Arrive on time to demonstrate professionalism and respect.
      • Make a Great First Impression: Greet the interviewer with a handshake, smile, and eye contact.
      • Confidence and Enthusiasm: Project a positive attitude and show your genuine interest in the opportunity.
      • Answer Thoughtfully: Listen carefully, take a moment to formulate clear and concise responses. Highlight relevant skills and experiences using the STAR method.
      • Ask Prepared Questions: Demonstrate curiosity and engagement with the role and company.
      • Follow Up: Send a thank-you email to the interviewer within 24 hours.
      Additional Tips:
      • Be Yourself: Let your personality shine through while maintaining professionalism.
      • Be Honest: Don't exaggerate your skills or experience.
      • Be Positive: Focus on your strengths and accomplishments.
      • Body Language: Maintain good posture, avoid fidgeting, and make eye contact.
      • Turn Off Phone: Avoid distractions during the interview.
      Final Thought:

      To prepare for your CI Cyber Threat Analyst interview at General Dynamics Information Technology, research the company, understand the job requirements, and practice common interview questions.

      Highlight your leadership skills, achievements, and strategic thinking abilities. Be prepared to discuss your experience with HR, including your approach to meeting targets as a team player. Additionally, review the General Dynamics Information Technology's products or services and be prepared to discuss how you can contribute to their success.

      By following these tips, you can increase your chances of making a positive impression and landing the job!

    • How to Set Up Job Alerts for CI Cyber Threat Analyst Positions

      Setting up job alerts for CI Cyber Threat Analyst is easy with United States Jobs Expertini. Simply visit our job alerts page here, enter your preferred job title and location, and choose how often you want to receive notifications. You'll get the latest job openings sent directly to your email for FREE!