Cyber Intel Analyst Stf Resume Sample
Work Experience
- Demonstrated understanding of cyber advanced persistent threats, actors, infrastructure, and TTP’s
- Familiarity or experience in Lockheed Martin's Intelligence Driven Defense, FIDO and/or Cyber Kill Chain methodology
- Manage a microelectronics exploitation laboratory, consisting of state-of-the-art tools for inspection, imaging, decapsulation, deprocessing and other activities related to hardware reverse engineering and exploitation
- Oversee reverse engineering, failure analysis and vulnerability analysis of hardware to identify exploitation opportunities
- Lead the modification of hardware to either enable forensic analysis of the media or to change the functionality of the hardware for other purposes
- Direct the development and maintenance of frameworks, processes, design patterns, techniques, tools and standards for conducting hardware exploitation of digital media
- Full-scope forensic examinations from the hardware aspect of media
Education
Professional Skills
- Experience requiring excellent interpersonal skills and working independently and on a team
- Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership
- Assembly language and C/C++ programming experience. Solid understanding of programming languages and operating system concepts
- Experience applying knowledge of C and assemble software development for embedded platforms that run commercial and/or custom operating systems
- Experience with the following operating systems: VxWorks, Integrity, Embedded Linux, JunOS, Linux, Unix, Windows Embedded
- Experience supporting DISA’s Network Assurance
- Ability and experience in responding to a variety of business needs
How to write Cyber Intel Analyst Stf Resume
Cyber Intel Analyst Stf role is responsible for engineering, software, training, security, reporting, design, assembly, digital, modeling, research.
To write great resume for cyber intel analyst stf job, your resume must include:
- Your contact information
- Work experience
- Education
- Skill listing
Contact Information For Cyber Intel Analyst Stf Resume
The section contact information is important in your cyber intel analyst stf resume. The recruiter has to be able to contact you ASAP if they like to offer you the job. This is why you need to provide your:
- First and last name
- Telephone number
Work Experience in Your Cyber Intel Analyst Stf Resume
The section work experience is an essential part of your cyber intel analyst stf resume. It’s the one thing the recruiter really cares about and pays the most attention to.
This section, however, is not just a list of your previous cyber intel analyst stf responsibilities. It's meant to present you as a wholesome candidate by showcasing your relevant accomplishments and should be tailored specifically to the particular cyber intel analyst stf position you're applying to.
The work experience section should be the detailed summary of your latest 3 or 4 positions.
Representative Cyber Intel Analyst Stf resume experience can include:
- Experience researching a hardware platform to understand the software and hardware interaction of embedded systems
- Prepare technical reports, present results and demonstrate system capabilities to peer review groups, managers, and sponsors
- Determine how a device boots/initializes and obtaining a binary that can be used for reverse engineering
- Given a target communications device, use reverse engineering tools and methods to determine vulnerabilities of the device for technical exploitation purposes
- Identify the function that respond to network connections requests, understand internal communications mechanisms, outlining the general structure of the system software and determining how system state is altered/saved
- Russian language, ILR 3/3 level of general proficiency (or equivalent certified language training standard) with a test date in the last 3 years
Education on a Cyber Intel Analyst Stf Resume
Make sure to make education a priority on your cyber intel analyst stf resume. If you’ve been working for a few years and have a few solid positions to show, put your education after your cyber intel analyst stf experience. For example, if you have a Ph.D in Neuroscience and a Master's in the same sphere, just list your Ph.D. Besides the doctorate, Master’s degrees go next, followed by Bachelor’s and finally, Associate’s degree.
Additional details to include:
- School you graduated from
- Major/ minor
- Year of graduation
- Location of school
These are the four additional pieces of information you should mention when listing your education on your resume.
Professional Skills in Cyber Intel Analyst Stf Resume
When listing skills on your cyber intel analyst stf resume, remember always to be honest about your level of ability. Include the Skills section after experience.
Present the most important skills in your resume, there's a list of typical cyber intel analyst stf skills:
- Experience requiring Advanced/Expert experience in microprocessors/architectures: ARM, MIPS, RISC, PowerPC, XScale, StrongARM, x86
- Experience requiring Advanced/Expert experience scripting languages: shell, Perl, Python or the like
- Familiarity with / experience researching Secure Sockets Layer (SSL) certificates and IP Geolocation
- Significant experience with the technical and programmatic aspects of leading research and development (R&D) projects
- Experience in Intelligence Driven Defense and/or Cyber Kill Chain methodology
- Experience with Operating System: RTOS
List of Typical Skills For a Cyber Intel Analyst Stf Resume
Skills For Cyber Intel Analyst Stf-jfhq J-fort Meade, MD Resume
- Experience applying Kill Chain analysis, Cyber Intelligence Preparation of the Environment (CIPE) modeling, Diamond modeling of cyber threat activity, or ODNI Cyber Threat Framework (CTF)
- Strong proficiency hunting APT data using open source cyber threat analytic tools or data repositories such as VirusTotal, Passive Total, Threat Miner, or Maltego
- Experience requiring Advanced/Expert experience in software tools and debuggers: Wireshark, IDA Pro, OllyDbg, pcap, gdb, make, hex exitor
- Formal training as an intelligence analyst in any discipline
- Certifications (any): CISSP, CEH, Network+, CCNA, Security+, SANS certification(s) such as GPEN or GCIH
- Clearance: TS/SCI w/ CI Poly
- Experience requiring skills in reverse engineering of embedded systems with proprietary operating systems for the express purpose of introducing functionally to an already existing fielded system
Skills For Cyber Intel Analyst Stf Resume
- Experience requiring Advanced/Expert knowledge of embedded system design, communication with peripheral devices at the hardware level and reverse engineering of system software
- Experience IDEs: Tornado, Workbench, VxSim, MULTI, TimeMachine, TraceEdge
- Experience in hardware tools and debugger: Green Hills Probe, SuperTrace Probe, Slingshot, spectrum analyzer, logic analyzer, JTAG, Agilent Technologies equipment
- Experience with microprocessor instruction sets
- Lead teams and participate in the analysis of embedded platform firmware and operating systems to understand security vulnerabilities associated with various platform communication links
- Develop and execute test plans to ensure all requirements of developed capabilities are fully satisfied
- Using knowledge gained through the application of reverse-engineering and other research techniques, design and develop low-level C and assembly applications for embedded ARM platforms that interface directly with platform hardware
- Provide data recovery processes for hard drives, thumb drives and other kinds of media with storage capacity