Cyber Operations Analyst Resume Samples

4.9 (113 votes) for Cyber Operations Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the cyber operations analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
TJ
T Jast
Toy
Jast
99580 Dorothy Cape
San Francisco
CA
+1 (555) 693 5980
99580 Dorothy Cape
San Francisco
CA
Phone
p +1 (555) 693 5980
Experience Experience
Chicago, IL
Cyber Operations Analyst Intern
Chicago, IL
Haag-Fadel
Chicago, IL
Cyber Operations Analyst Intern
  • Develop technical summary information for presentation to management
  • Identify gaps in cyber operations capabilities and assist in developing those capabilities
  • Knowledge of Windows, Linux, and networking
  • Research system and network logs and alerts as they relate to incidents
  • Familiarity with using scripting languages for security automation
  • Maintain in-place security tools and processes
  • Respond to computer security incidents
Los Angeles, CA
Cyber Operations Analyst
Los Angeles, CA
Baumbach-Conroy
Los Angeles, CA
Cyber Operations Analyst
  • Suggesting and implementing improvements to the incident response process and providing guidance to junior analysts
  • Identifying gaps in cyber operations capabilities and assisting with developing those capabilities
  • Ensures policies and authorizes provide the development and exercise of CNO capabilities
  • Developing technical summary information for presentation to management
  • Develops and conducts on- going research to support the development of CNO planning
  • Researching system and network logs and alerts as they relate to incidents
  • Investigates and tracks Information Operations (IO) and CNO development in the DoD, civilian organizations, and other countries as necessary
present
New York, NY
Mid-level All Source Cyber Operations Analyst
New York, NY
Kilback-Bahringer
present
New York, NY
Mid-level All Source Cyber Operations Analyst
present
  • Clearly and effectively communicate through written and verbal communications with senior government personnel ranging from intelligence analysts, planners and operators to senior decision-makers. Contractor shall produce and brief presentations conforming to Command standards
  • Provide intelligence support for Joint Cyber Center (JCC) functions, including cyberspace operations, plans, and defense of USSTRATCOM mission systems
  • Provide intelligence support for the USSTRATCOM’s Cyber Mission Force (CMF), including the Combat Mission Team(s) (CMT) and Cyber Protection Teams (CPT)
  • Assist with writing and coordination of intelligence offensive and defensive analytical products
  • Provide intelligence support to all aspects of planning, including Joint Planning Groups (JPG), Operations Planning Group (OPG) and Core Analytic Team (CAT) activities including conducting cyber portions of the JIPOE
  • Perform all intelligence analysis related aspects of collection and production management to include writing and submitting evaluations and providing feedback to collectors and producers
  • Participate in meetings, briefings, conferences and symposiums as directed. Contractor shall prepare and present necessary information and data, produce minutes and recommend solutions to identified problems, or a trip report if travel was involved
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Rowan University
Bachelor’s Degree in Computer Science
Skills Skills
  • Excellent writing skills and ability to communicate effectively, including public speaking, and briefing senior officers
  • Strong attention to detail and organizational skills
  • Excellent writing skills and ability to communicate effectively, and briefing senior officers
  • Strong Microsoft Office and experience
  • Knowledge of and Experience with Cyber Security Endorsements
  • Ability to develop briefing materials, administrative support
  • Knowledge or and Experience with Cyber Strategic Engagements
  • Proficiency in the use of Microsoft Office Suite
  • Ability to develop briefing materials, administrative, and logistics support
  • Qualification as a JSO
Create a Resume in Minutes

15 Cyber Operations Analyst resume templates

1

Cyber Operations Analyst Secure Works Resume Examples & Samples

  • Member of team responsible for monitoring and resolution of security incidents within established service level agreements
  • Performing daily operational 'eyes on glass' real-time monitoring and analysis of security events from multiple sources including but not limited to events from Security Information & Event Monitoring (Splunk) tools, network and host based intrusion detection systems, firewall logs, system logs (Unix & Windows), applications, and databases
  • Collaboration with technical teams for issue resolution and mitigation
  • Documentation of actions taken for audit, regulatory and legal purposes within approved event tracking system
  • Services to be monitored and delivered include, but are not limited to SIEM, Intrusion Detection Service (“IDS”) Intrusion Prevention Services (“IPS”), Firewall, Web Content Filtering, Data Loss Prevention (“DLP”), Proxy, and Security Event Correlation and Reporting to appropriate Buyer incident handling staff or relevant sources
  • Monitor IT defense perimeter and scanning infrastructure and communicate security events and incidents in accordance with play book guidelines
  • Monitor and analyze the output from various security perimeter monitoring devices and recommend security actions per procedures where required
  • Coordinate with SOC Infrastructure Support team to maintain/troubleshoot defense perimeter and monitoring integrity
  • Maintain knowledge and attend briefings from the Supplier Counter Threat Unit (“CTU”)
2

Defensive Cyber Operations Analyst, Mid Resume Examples & Samples

  • Knowledge of computer network defense and Cybersecurity
  • Knowledge of network threat analysis
  • Knowledge of network vulnerability analysis and network vulnerability mitigation
  • Knowledge of intrusion detection technology
  • Knowledge of network security protocols
  • Microsoft Security+ Certification
  • Experience with working issues in or working in support of the Korean Theater of Operations (KTO)
  • Experience with using Microsoft products, including Word, PowerPoint, Excel, Outlook, and SharePoint
  • Knowledge of network forensic analysis
  • Knowledge of malware analysis and reverse engineering
  • Knowledge of UNIX operating systems
  • Knowledge of Microsoft Operating System
  • Knowledge of network architectures
3

Cyber Operations Analyst Resume Examples & Samples

  • Five to twelve years of experience with deliberate planning and the Adaptive Planning Process
  • Must have recent operational experience with developing and executing strategic guidance to completion of COCOM level one through level four contingency plans
  • Design of maneuver, fires and effects through the application of capabilities in and through the cyber domain
  • Creation and dissemination of orders and directives to provide guidance to the DoD community
  • Qualification as a JSO
4

Cyber Operations Analyst Resume Examples & Samples

  • Responding to computer security incidents
  • Suggesting and implementing improvements to the incident response process and providing guidance to junior analysts
  • Researching system and network logs and alerts as they relate to incidents
  • Coordinating efforts among multiple business units during response activities
  • Identifying gaps in cyber operations capabilities and assisting with developing those capabilities
  • Assisting in the evaluation and implementation of new security technologies for the enterprise environment
  • Developing technical summary information for presentation to management
  • Providing on-call support for in-place security solutions
5

Mid-level All Source Cyber Operations Analyst Resume Examples & Samples

  • Conduct cyber-focused all-source intelligence analysis to deliver situational awareness, support to plans and operations, and finished products in government-directed product formats. Tailor and apply all authorized sources of information and intelligence, including open source, research, collaborate, fuse, analyze, write and disseminate intelligence products. (CDRL A003)
  • Evaluate changes in adversary TTP, threats, requirements, and system environments. Provide the cyber expertise, experience and familiarity with understanding the adversary, including capability, intent and strategic threat implication
  • Provide intelligence support for Joint Cyber Center (JCC) functions, including cyberspace operations, plans, and defense of USSTRATCOM mission systems
  • Assess adversary capability and intent for USSTRATCOM missions and Cyber Key Terrain
  • Provide intelligence support to J3 for intelligence needs and requirements for offensive cyberspace operations (OCO)
  • Assist with writing and coordination of intelligence offensive and defensive analytical products
  • Assist with alerting proper organizations to incidents on USSTRATCOM networks that are reportable via Intelligence Information Reports (IIR); submitting evaluations and providing follow-up information and analytical comments as requested
  • Assist with writing, coordination, and tracking of production requirements for USSTRATCOM CMF
  • Provide intelligence support for intelligence and command training. The contractor shall develop cyber-related education and training requirements and construct and conduct cyber training courses and training plans, as requested by the government
  • Build and maintain continuity books, standard operating procedures (SOP), spreadsheets and visualization charts, such as Analyst Notebook, to ensure all research and background knowledge is captured and documented. Continuity books will record and document research, search queries, and analysis techniques and will include area of responsibility points of contact
  • Participate in meetings, briefings, conferences and symposiums as directed. Contractor shall prepare and present necessary information and data, produce minutes and recommend solutions to identified problems, or a trip report if travel was involved
  • Clearly and effectively communicate through written and verbal communications with senior government personnel ranging from intelligence analysts, planners and operators to senior decision-makers. Contractor shall produce and brief presentations conforming to Command standards
  • Five (5) years of demonstrated relevant cyber analytical experience and ability to assess adversary capability and intent against USSTRATCOM missions and Cyber Key Terrain
6

Defensive Cyber Operations Analyst Resume Examples & Samples

  • 5+ years of experience in the CND field
  • 5+ years of experience with Local and Wide Area Network technologies, networking protocols, file systems, ports and services, or Windows and Linux commands
  • 3+ years of experience with design, development, integration, implementation, operation, and analysis of Cybersecurity technologies used with the DoD, IC, and Federal Cybersecurity initiatives
  • 2+ years of experience with the interpretation and implementation of DoD and IC CND directives and manuals
  • Knowledge of intelligence gathering, analysis, and dissemination techniques in a Cybersecurity area
  • HS diploma or GED and 8 years of experience with Cybersecurity or BA or BS degree in CS, IT, or Information Assurance and 4 years of experience with Cybersecurity
  • GIAC Certified Intrusion Analyst (GCIA), Certified Ethical Hacker (CEH), CIAC Certified Incident Handler (GCIH), or Computer Security Incident Handler (CSIH) Certification
  • Experience with Federal, DoD, IC, and industry standards in the creation of best practices and standard operating procedures (SOPs)
  • Experience with the development and implementation of computer network defense tactics, techniques, and procedures (TTPs)
  • Experience with analyzing network traffic packet captures tools, including WireShark
  • Experience with Network Intrusion Detection and Prevention Systems, including Cisco ASA, HP Tipping Point, or McAfee IntraShield and host-based IDS/IPS, including McAfee ePO and HBSS
  • Experience with conducting vulnerability assessments using Retina, Nessus, WASSP or SECSCN, and subsequent remediation of security control deficiencies
  • Experience with Web content filters and e-mail content filters, including McAfee Web Gateway and McAfee E-mail Gateway
  • Experience with collecting and analyzing forensic images and other data tools, including EnCase Enterprise, EnCase CyberSecurity, LinEn and netcat, recovery CDs, and SysInternals tools
  • Possession of excellent interpersonal, organizational, time management, analytic, and problem-solving skills
7

Senior Cyber Operations Analyst Resume Examples & Samples

  • Participates in the development of a cyber security operations program that is capable of monitoring the NBA environment
  • Works closely with enterprise IT Operations and other functional area specialists to ensure threat indicators are rated by severity and responded to in a manner consistent with the threat
  • Contributes to the development and maintenance of the cyber security strategy
  • Develops the Global Threat and Vulnerability Management process to ensure a well-definedprogram operates to identify, risk rate, and track vulnerabilities to remediation
  • Administers the Security Intelligence process to ensure security threat information, system log information, and sources of external intelligence are combined to provide real time response to cyber events
  • Executes the malware response and containment process when issues arise
  • Develops & leads data loss prevention process for data at rest and data in motion
  • Creates security standards for desktops, servers & network devices
  • Is a participant in the IT portion of the Incident Response program on a global basis
  • Gathers and reports on metrics regarding all security systems within the global NBA environment
  • Serves as a contact with the NBA's Managed Security Service and other third party vendors as appropriate
  • Knowledge of NIST 800-53, COBIT, ISO 27001/02
  • Possesses the ability to weigh business risks and ensure compliance with appropriate information security measures
  • Possess a high energy level and strong work ethic with a commitment to continuous improvement in a dynamic and changing environment that strives to exceed expectations
  • Exposure to both physical and logical information security systems
  • Ability to handle multiple priorities and deal effectively with the NBA senior management, staff members, and vendors
  • Capable of exercising discretion and using independent judgment in making decisions, and can work with minimal functional guidance
  • Must possess a high degree of integrity and trust along with the ability to work independently
  • Experience with security related technologies including: Security Information and Event Management Systems (IBM Q-Radar), Two Factor Authentication Systems, Data Loss Prevention Systems (McAfee Total Protection for DLP), Administrative Account Management Systems (CyberArk), Laptop and file system encryption tools, Vulnerability Management systems (Rapid 7), Intrusion Protection / Detection systems (Tripwire, Cisco SourceFire), and other pertinent technologies in this space
  • Knowlege of Microsoft Windows, Red Hat Linux, VMware, and SAN storage platforms and protocols
  • Experience with the implementation of automated system monitoring tools
  • Understanding of a broad range of IS issues, including firewalls, user authentication, access controls, auditing processes, cryptography, Internet protocols, physical security, and security management
  • Exposure to Microsoft SQL Server 2008/2012 , MySQL, and Oracle preferred
  • Knowledge of Amazon Web Services and other IAAS systems desirable
  • Bachelor's degree in Computer Science, Information Systems or a technically related discipline
  • 4+ years of experience in IT with 3+ years of experience in the Information Security area
  • CISSP, CISA, or CISM strongly preferred
8

Defensive Cyber Operations Analyst Resume Examples & Samples

  • Research advanced persistent threats and emerging cyber threats
  • Create finished intelligence products, including briefings and situation reports
  • Perform Indications & Warnings analysis
  • Develop and implement computer network defense tactics
  • Support vulnerability management and assessment technologies, and cyber security tools
  • Conduct vulnerability assessments
  • Coordinate incident response in the instance of a cyber security incident or breach
  • Identify and classify attacks, malware, signatures, and countermeasures
  • BS in Computer Science, Information Technology, Information Assurance, or related field OR 8+ years of experience in related field in lieu of degree
  • 5+ years of experience in computer network defense/ defensive cyber operations
  • 2+ years of experience with DoD Directive 8530.02M, CJCS Instruction 6510.01F, CJCSM 6510.01B
  • Computer Network Defense Certification
  • 3+ years of experience with cyber security technology, including design, development, integration, implementation, operation, and analysis
  • 5+ years of experience with LAN/WAN, networking protocols, TCP/IP, OSI model, O/S, file systems, ports, Windows, Unix/Linux
  • Experience with McAfee ePolicy Orchestrator(HBSS), Tenable Security Center/Nessus (ACAS) and Intrusion Detection/Prevention Systems
  • Knowledge of computer network defense policies and procedures, general attack stages, and common adversary tactics, techniques, and procedures
  • Experience with virtualization technologies, including VMWare and VirtualBox
  • Experience with WireShark
  • Briefing experience
  • Critical thinking skills and strong attention to detail
9

Defense Cyber Operations Analyst Resume Examples & Samples

  • Five years of experience in Computer Network Operations (CNO) Planning
  • Knowledge of joint military decision making processes
  • Experience producing Operational Plans, Operational Orders and Fragmentary Orders
  • Understanding of CNO strategy
  • Joint Service Officer (JSO) qualification and/or significant experience with Contingency Planning and FIRES integration
  • Experience in support of Service, COCOM or JS cyber exercise as a player or planner
  • Proficiency in the use of Microsoft Office Suite
10

Cyber Operations Analyst Resume Examples & Samples

  • Create visual displays conveying situational awareness and engagement effectiveness assessments to the operational crews
  • Develop methodologies, analyze data, perform network characterization and brief results, as needed, in support of IP network awareness assessments for operations, exercises, testing, and training
  • Support one vs. one engagement-level modeling and related higher order modeling as required to enhance operational, strategic, and tactical planning as well as operational training and exercise support
  • B.S., Computer Science or a related field with five (5) years of experience or M.S., Computer Science or related scientific/technical field with three (3) years of experience; or equivalent combination of training and experience
  • Exceptionally well-versed in real world OPLANS, CONPLANS, and planning
  • Have experience in basic scripting and/or programming in a high level language
11

Cyber Operations Analyst Intern Resume Examples & Samples

  • Maintain in-place security tools and processes
  • Evaluate, test and implement new security tools & technologies
  • Respond to computer security incidents
  • Research system and network logs and alerts as they relate to incidents
  • Identify gaps in cyber operations capabilities and assist in developing those capabilities
  • Develop technical summary information for presentation to management
12

Cyber Operations Analyst, Senior Resume Examples & Samples

  • 5+ years of experience with Cyber operations
  • Experience in developing policy or advocating for changes in policy to support new initiatives
  • Experience in Microsoft Word, PowerPoint, Excel, Outlook, and SharePoint required
  • Ability to work rotating shifts in a 24x7 operational environment and respond quickly to emergencies, as needed
  • Experience with the production of technical documents, briefings, and process documents
  • Experience with Microsoft Project, Access, Visio, and Adobe Acrobat
  • DoD 8570.01- M IAT Level I Certification with Continuing Education (CE)
13

Defensive Cyber Operations Analyst Resume Examples & Samples

  • Experience with Joint planning and operations processes
  • Experience with DCO capabilities development
  • Experience in working with service and Joint planning staff conducting operations planning
  • BS degree and 3 years of experience with military defensive Cyber operations or 10 years of experience with Cyberspace operations
  • MS degree
14

Defensive Cyber Operations Analyst Resume Examples & Samples

  • Experience with developing CONOPs and procedures
  • Experience with the planning peculiarities of special technical operations
  • Knowledge of capabilities available for employment and capabilities of various infrastructures
  • BS degree and 3 years of experience with Military Cyberspace Operations or 10 years of experience with Military Cyberspace Operations in lieu of a Bachelor’s degree
15

Cyber Operations Analyst Resume Examples & Samples

  • 5+ years of experience with vulnerability tool configuration, deployment, engineering, and defining policies and procedures based on government best practices
  • Experience with Cybersecurity tools, including Splunk ES, Gigamon Taps, Sourcefire, Security Center, Nessus, Twistlock, Cylance, and data loss prevention tools
  • Experience in working with security operations center (SOC), CSIRT, and Cyber operations teams
  • Experience with developing and maintaining policies and standard operating procedures (SOPs) which define operational processes for vulnerability analysis, reporting, and event response or management
  • Experience with Tenable and Splunk
  • Experience with Cylance, Triton Forcepoint, or Amazon Web Services (AWS)
  • Minimum Public Trust clearance preferred
16

Defensive Cyber Operations Analyst, Senior Resume Examples & Samples

  • 5+ years of experience in the CND discipline
  • 5+ years of experience with Local and Wide Area Network technologies, networking protocols, file systems, or Windows and Linux commands
  • 3+ years of experience with the design, development, integration, operation, and analysis of Cybersecurity technologies used in the DoD and the intelligence community (IC)
  • 2+ years of experience with implementing and interpreting DoD and Chairman of the Joint Chiefs of Staff (CJCS) CND directives
  • DoD 8570.01–M Compliant Certifications one of more of the following: Global Information Assurance Certification (GIAC), Certified Intrusion Analyst (GCIA), Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), or Computer Security Incident Handler (CSIH)
  • BA or BS degree in CS, IT, Information Assurance, or a related field or 8+ years of relevant professional experience in those fields
  • Experience with using Federal, DoD, IC, and industry standards in creating best practices, manuals, and standard operating procedures
  • Experience with the development and implementation of CND tactics, techniques, and procedures (TTPs)
  • Experience with researching Advanced Persistent Threats and emerging Cyber threats to create fused briefs and situation reports
  • Experience with monitoring and detection, identification, categorization, eradication, response, recovery, and mitigation of Cybersecurity incidents and breaches
  • Experience with analyzing network traffic packet captures and analysis tools and methodologies
  • Experience with Network Intrusion Detection/Prevention Systems (IDS/IPS), and host–based IDS and IPS, including specifically McAfee Electronic Policy Orchestrator (ePO) and Host–Based Security System (HBSS)
  • Experience with identifying and classifying attack vectors, malware detection and analysis, IDS and IPS rule writing, and countermeasure development
  • Experience with conducting vulnerability assessments using eEye Retina, Tenable Nessus, WASSP and SECSCN, and remediation of security control deficiencies
  • Experience with Web content filters and e–mail content filters, including Smart Filter, McAfee Web Gateway, and McAfee E–mail Gateway
  • Experience with tuning, operations, and analysis of Security Information and Event Management (SIEM) capabilities, including HP ArcSight and Splunk
  • Experience with collecting, acquiring, and analyzing forensic images and other data tools, including EnCase Enterprise, EnCase Cybersecurity, LinEn, and netcat, recovery CDs, including ERD Commander and Hiren, and SysInternals tools
  • Knowledge of network security architecture concepts, including topology, protocols, components and principles, such as application of defense–in–depth
  • Knowledge of general attack stages, including footprinting and scanning, enumeration, gaining access, escalation of privileges, network exploitation, or covering tracks
  • Knowledge of policies and processes related to CND implementation, execution, and management
  • Knowledge of virtualization technologies and common enterprise solutions
  • Knowledge of firewall rules and routing rules and scripting and coding languages
  • Knowledge of reverse engineering malware and writing detailed findings and reports
  • Possession of excellent interpersonal, organizational, time management, briefing, analytical, and problem–solving skills
  • Possession of excellent written communication skills
17

Cyber Operations Analyst Resume Examples & Samples

  • Bachelor’s (BA or BS) degree in a technical field
  • Minimum of 7-9 years of experience
  • Strong military operational background and experience required
  • IAT OR IAM Level II OR III required
  • Staff experience at a Combatant Command (COCOM), Major Command or Joint Staff is required & leadership experience in ground maneuver forces and Combat experience in CENTCOM AOR is a plus
  • Strong communications and writing skills required
  • Ability to develop briefing materials, administrative support
  • Excellent writing skills and ability to communicate effectively, and briefing senior officers
  • Knowledge of and Experience with Cyber Security Endorsements
  • Experience with Cross Domain Solutions
  • Knowledge or and Experience with Cyber Strategic Engagements
  • Experience with Forces and Strategy
18

Junior Cyber Operations Analyst Resume Examples & Samples

  • Minimum 2-3 years of experience
  • Military operational background and experience is ideal
  • DoD 8570/8140 IAT Level II Certification (Sec+)
  • DoD 8570/8140 IAM Level III Certification (GSLC, CISM, or CISSP)
  • Experience at a Combatant Command (COCOM), Major Command or Joint Staff is required, and leadership experience in ground maneuver forces and Combat experience in CENTCOM AOR a plus
  • Strong Microsoft Office and experience
19

Cyber Operations Analyst Resume Examples & Samples

  • Ensure that all controls related to Vulnerability Management are demonstrable and sustainable, identify issues and support action plans to strengthen Vulnerability Management control effectiveness
  • Develop and document processes to ensure consistent and scalable response operations and ensure continuous improvement to the firm’s incident response plans
  • Provide operational support to incident responders during critical or large scale incidents
  • Review Security events assigned by Cybersecurity and work with stakeholders to resolve
  • Review & process DLP alerts escalated by Cybersecurity and provide outcome decision to appropriate management for action
  • Ensure that the Incident response framework complies with applicable security policies and industry standards
  • Communicate effectively with representatives of the Lines of Business, technology specialists, and third parties
  • Demonstrated experience in driving innovative approaches to incident coordination
  • Experience working across multiple lines of business in a corporate function
  • Excellent writing and presentation skills
  • Outstanding verbal, interpersonal and written communication and presentation skills, including demonstrated ability to interact with both technical and non-technical stakeholders
  • 7-10 years of experience in incident coordination roles
  • Must have a solid background in production incident management
  • Undergraduate or higher level degree in a relevant discipline
  • CRISC, CISSP or CISM/CISA certifications a plus
20

Cyber Operations Analyst, Senior Resume Examples & Samples

  • 12+ years of experience in current Air Force SIGINT/ISR and Cyber capabilities with at least 6+ of those years of experience in SIGINT systems, operations, and intelligence support requirements
  • 6+ years of experience with project management
  • Experience with writing, interpreting, inspecting, implementing, or training national and AF SIGINT or Cyber or ISR policy, directives, and guidance
  • Experience with operations and policies authorized under US Code Title 32, Title 50, and Title 10 as they apply to ISR and Cyberspace policies, capabilities, weapons, tactics, and issues
  • Experience with Air Force staff actions, including operational instructions, bullet background papers, Air Force memos, Air Force instructions, or other policy manuals and directives
  • Experience with writing, interpreting, inspecting, or implementing AF or Joint SIGINT, ISR, or Cyberspace doctrine
  • Experience in working with National Guard Bureau, US Cyber Command (USCYBERCOM), and Air Force Cyber (AFCYBER)
  • Ability to travel between program management sites
  • Experience with Air Component, Combatant Command, National Guard Bureau, or Air Force Major Command intelligence requirements
  • Ability to multitask and work independently or in a team
  • Possession of excellent oral and written communication skills for usage with diverse teams of geographically dispersed professionals
  • Possession of excellent client service, problem–solving, analytical, organizational, and planning skills
  • BA or BS degree in Operations Management, Intelligence, or a related field