The Bison Group logo

Cyber Intelligence Analyst, Jr

The Bison Group
Full-time
On-site
Quantico, Virginia, United States
IT/Tech
Full-time
Description

   

Bison Group – Mission First. People Always.

At Bison Group LLC, we are more than a defense contractor — we’re a people-driven small business built on trust, respect, and purpose. We value every team member, encourage open communication, and proudly support the veteran community through real action.

Join us, and you’ll be part of a mission-focused team where your work directly supports the Department of Defense and national security. Your skills matter, your growth is encouraged, and your impact is clear.


  • Evaluate the cybersecurity stance of a USMC defense program, ensuring it adapts to  leading cybersecurity practices and prioritizes cyber threats based on  comprehensive cyber analysis.
  • Examine foreign capabilities to detect, disrupt, and block USMC emissions and signals across the entire cyber kill chain, including, but not limited to, emissions from targeting, communications, and ISR (Intelligence, Surveillance, and Reconnaissance) systems, as well as reversible and  non-reversible attacks.
  • Monitor and assess advancements in emerging and commercial technologies that state and non-state actors could leverage to detect, disrupt, or compromise USMC  acquisition programs' network infrastructure.
  • Identify critical risk factors within the environment, such as network classification, baseline activity, system architecture, operating systems, services, connectivity,  and bandwidth.
  • Determine the boundaries of the network for potential collection activities.
  • Define the limits of connected or supporting networks that may require collection efforts.
  • Evaluate existing databases to identify intelligence gaps.
  • Utilize open-source information to collect Publicly Available Information (PAI).
  • Investigate the physical battlespace to understand how the environment could influence tactical operations.
  • Characterize the effects of the battlespace.
  • Analyze the battlespace environment in terms of information, services, and networks, focusing on confidentiality, integrity, and availability, and evaluating mechanisms to protect, detect, respond, restore, and conduct reviews.
  • Examine additional characteristics of the battlespace, such as security measures, auditing  procedures, and backup systems. Assess the adversary's physical location of assets, architecture, automation capabilities, security policies, baseline activity, vulnerabilities, and conclusions related to Rules of  Engagement (ROE) for Information Assurance (IA), Computer Network Defense (CND), and Computer Network Attack (CNA).
  • Identify potential Courses of Action (COA) for the adversary.
  • Determine the adversary's likely objectives and desired outcomes.
  • Identify all possible COAs available to the adversary, with an emphasis on the most likely and most dangerous options.
  • Develop COAs based on the adversary's perspective of friendly information architecture (reverse cyber IPB).
  • Evaluate and prioritize each adversary's COA.
  • Continuously refine COAs as new information becomes available over time.
  • Assess foreign Computer Network Defense (CND) and Computer Network Attack (CNA) capabilities, limitations, and vulnerabilities.
  • Evaluate potential vulnerabilities in USMC tactical systems to CNA, including systems  associated with targeting, ISR, and navigation.
  • Provide  portfolio-specific analysis, expertise, and intelligence production as  outlined below.
  • Conduct Threat Steering Groups with participants from USMC Combat Development & Integration to identify key factors and significant risk drivers for potential material solutions that may influence lifecycle cost, performance, schedule, and      other acquisition decisions.
  • Produce and deliver Validated Online Lifecycle Threat Reports (VOLTs), Critical Intelligence Parameters (CIPs), and Capability Development Threat Summaries to support  Marine Corps Acquisition Programs throughout the Joint Capabilities Integration and Development System (JCIDS) process, assisting the Defense Acquisition System.

 
  Bison Group is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by applicable law. 

Requirements

  

  • TS/SCI Security      Clearance
  • Desired Experience: At least 3 years of experience conducting analysis relevant to the labor category, with at least some of the experience within the last 2 years.
  • Desired Education: Bachelor's degree in a field related to the labor category from an accredited college or university recognized by the U.S. Department of Education. Alternatively, an additional 4 years of experience in the specific labor category, totaling 7 years, may substitute for a Bachelor's degree.
  • Demonstrates a working knowledge of the concepts involved in the specific functions outlined in the labor category description.
  • Knowledgeable of and demonstrates the ability to apply IC and DoD classification guidelines and procedures.
  • Demonstrates the ability to work semi-independently with oversight and direction.
  • Demonstrates the ability  to apply logic when evaluating and synthesizing multiple sources of information. Shows understanding of interpreting analysis, including its meaning, significance, and implications. Demonstrates the ability to      defend analytic judgments with sound, logical conclusions, and to adapt these judgments when new information, changing conditions, or unexpected developments arise.
  • Demonstrates the ability to produce timely, logical, and concise analytic reports, documents, assessments, studies, and briefing materials in various formats, including Microsoft Office tools (e.g., Excel, Word, PowerPoint), electronic/soft copy matrices, and/or web-enabled formats.
  • Demonstrates the ability to clearly communicate complex issues in a concise and organized manner, both verbally and non-verbally, with strong grammar skills. Demonstrates proficiency with Microsoft Office tools.
  • Demonstrates the ability to develop structured research, including but not limited to obtaining, evaluating, organizing, and maintaining information within security and data protocols.
  • Demonstrates the ability to recognize nuances and resolve contradictions and inconsistencies in information.
  • Demonstrates working knowledge of complex analytic methodologies, such as structured analytic techniques or alternative approaches, to examine biases, assumptions, and theories, reducing uncertainty, strengthening analytic arguments, and      mitigating surprise. Structured analytic techniques include, but are not limited to, Analysis of Competing Hypotheses, Devil's Advocacy,   High-Impact / Low-Impact Analysis, Red Team Analysis, and Alternative Futures Analysis.
  • Demonstrates understanding of intelligence collection capabilities and limitations, including but not limited to technical sensors/platforms and human intelligence sources relevant to the labor category.
  • Demonstrates understanding of evaluating collected intelligence reporting, engaging with collection managers, and developing collection requirements.
Apply now
Share this job