• Cyber Analysis Support Specialist (Junior) - Mandarin

    Location US-HI-Kunia
    Posted Date 3 months ago(3 months ago)
    Job ID
    # Positions
    Experience (Years)
    Cyber Security
  • Overview

    This effort requires personnel who can research, analyze, and report on computer network probes/attacks, trends, and hacker tools and techniques to produce indications and warning reports on impending network attacks against U.S. Defense and national infrastructure systems. In addition, personnel must be able to analyze network nodes (people and groups) and characterize linkages that show the relationships or flows between nodes.


    • Performing tasks associated with the SIGINT and/or other intelligence disciplines' production cycle, including researching, tasking, analysis, reporting, assessing, and interacting with customers.
    • Analyzing and assessing technical and operational vulnerabilities in U.S./DoD or foreign current or emerging technologies or operations, and determining risk to U.S. networks of interest posed by adversarial systems, activities or operations.
    • Analyzing all-source intelligence data, identifying critical threat information, researching historical threat reporting, and crafting assessments in support of customer information needs.
    • Performing all-source research to identify and report on the intentions and capabilities of adversaries, state and non-state sponsored, to threaten, exploit or otherwise disrupt networks of interest to the U.S. and its allies.
    • Assisting with the development of databases and other knowledge repositories on adversary information warfare and hacker capabilities, intentions and supporting infrastructures.
    • Compiling and correlating data sets to determine levels of threats and vulnerabilities to U.S. network systems.
    • Producing threat/vulnerability assessments.
    • Performing risk and opportunity assessments through synthesis of information across intelligence disciplines and open-source information.
    • Supporting customer efforts to partner with other organizations on the identification of vulnerabilities and corresponding threats with the goal of influencing mitigation strategies and solutions.
    • Researching and analyzing data using available and appropriate analytic tools.
    • Assisting technical personnel in developing automated analytic tools by providing specific information about adversary targets and techniques.
    • Developing end-product report drafts and entering them into report production systems.
    • Assisting in the evaluation and staffing of Information Needs (IN); interacting with customers, other production elements and data acquisition offices in order to meet customer needs.
    • Scheduling meetings, analytic exchanges, organizing data and providing threat analysis support to branch and division-level managers.
    • Participating in team building research efforts, sharing analytical techniques and research methodologies.
    • Contributing to knowledge management by entering sources and analytic findings into appropriate databases and other repositories on a timely basis.
    • Meeting customers' delivery deadlines and satisfying customer expectations for accuracy and completeness.
    • Documenting reports and customer feedback in local Request for Information (RFI) tracking databases and other recording systems.
    • Identifying adversary presence in the Internet and using visualization tools to map the information systems, networks and major servers they use.
    • Using research and analytic findings to identify network associations and map them in diagram/topology presentations.
    • Performing baseline and secondary analysis and providing visualization support by using Analyst Notebook and NetViz or other visualization tools.
    • Making recommendations for additional collection possibilities when and where possible.
    • Conducting and tracking behavior analysis and characterization of adversary decision processes, their technological dependencies and social network connections.
    • Documenting all research and analysis using standard document and network mapping tools.


    *All Candidates must have a TS/SCI clearance with Polygraph

    • Shall have a minimum of four (4) continuous years of work experience in intelligence analysis or a related field, or a combination of a minimum of two (2) continuous years of work experience in intelligence analysis or a related field and a Bachelor’s degree in an applicable (math, science, computers, engineering) field.
    • Work experience shall include two (2) years of IC or related experience in intelligence analysis.
    • Shall have demonstrated competence with relevant Computer Network Operations (CNO) and SIGINT tools and databases used for the customer mission, and communications skills that include the ability to provide formal documentation of analysis and/or research results.
    • Shall be considered a SME in one or more fields appropriate to Intelligence Analysis or Computer Networking technologies, and be able to serve as a SME for working groups and meetings with partner organizations/agencies.
    • Shall have demonstrated expertise in analyzing intelligence information and technical data, analyzing exploitation opportunities, documenting information and processes, gathering intelligence information, interpreting analytical results, performing Internet research, writing and editing skills at a technical/professional level, and managing internal and external customer relations.
    • Shall be an effective writer and verbal communicator.
    • Must have experience as a Mandarin linguist with a 2+/2+ DLPT.

    • Must be able to translate technical terms in Mandarin.
    • Reporting skills are desired.
    • Proficiency in Cantonese and Vietnamese is desired.




    WOOD is an Equal Employment Opportunity Employer; all qualified applicants are encouraged to apply and will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, or veteran status.


    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed