We’re looking for Eagle Ray people. Eagle Ray is a rapidly growing, woman owned business specializing in strategic transformation services. We deliver complex professional services across the IC, DoD and DHS. With Eagle Ray’s help, our clients reduce cost and program risk, enhance operational performance and drive the development of new capabilities to end users in the National Security Enterprise. We offer an engaging corporate culture, a dynamic work environment and competitive total compensation.
Insight. Impact. Innovation. Eagle Ray people are hands-on, results-oriented, and invested in the success of our customers’ missions. Come work with us, you can really make a difference!
Produce, per analyst on average, 36 weekly threat reports, eight monthly threat reports, three quarterly threat reports, and one annual threat study for their specific focus or area. In addition, each analyst will average six reports of inquiry (ROI) and or requests for information (RFI) and publish or contribute to nine Intelligence Information Reports (IIR) annually. Finally, each analyst will produce, on average, 48 weekly status reports.
Support team members in completing forensics reports, CI Cyber Inquiries, and monthly, quarterly, and annual CI Cyber Threat reports.
Identify, analyze, define, and coordinate user, customer and stakeholder needs and translate them into technical requirements.
Detect anomalous activity through network data analysis.
Develop custom scripts/programs for automated cyber analytical tools.
Record best practices, lessons-learned, processes and procedures, and other pertinent quality topics in appropriate formats.
Design, construct and maintain a working lab environment for testing and research of advanced technical attack techniques and potential detection solutions.
Evaluate and analyze Intrusion Detection, incident tickets, event and log analysis, security change tracking and other network security systems and devices to identify risks and if required make recommendations for corrective actions.
Investigate instances of malicious code to determine attack vector, payload, potential origin, and determine extent of damage and data exfiltration and provide written reports based on findings.
Assist in the development and delivery of malware threat awareness products and briefings.
Collaborate with customers and team members to facilitate a premier malware program.
Bachelor’s Degree in Computer Science, Engineering, or a related technical discipline, or the equivalent combination of education, technical certifications or training, or work experience.
7 years of network analysis experience.
Mandatory Travel = 25%
Experience with network analysis tools, such as Wireshark.
Strong research, critical thinking and analytic skills.
Strong written and oral communication skills.
Strong listening and recognition skills.
Understanding of mission urgency.
Strong time management, prioritization, production, leadership and followership skills.
Graduate of an accredited federal or DoD CI training academy.
Post-graduate degree in Computer Science, Engineering, or a related technical discipline or the equivalent combination of education, technical certifications or training, or work experience.
Equal Opportunity Employer/M/F/Disability/Vet/Sexual Orientation/Gender Identity