Contingent Upon Award
Active Top Secret clearance with eligibility for SCI required.
Echelon is seeking a Cyber Operations Planner who will identify and prioritize cybersecurity risks to national critical infrastructure to inform the development of cyber operations plans and programs ensuring that the government customers function of integrating information on cyber threats, vulnerabilities, and consequences. It uses resources and capabilities from public and private sector stakeholders to identify, analyze, and prioritize cybersecurity risks of national significance.
Essential Functions
- Support the development of risk analysis models, tools, and methodologies to enable risk prioritization.
- Support the development of standard risk analysis policies, standard operating procedures, and similar documents to ensure standardized approaches across the JCDC Planning Office.
- Support the development of risk analysis processes and procedures incorporating data and capabilities from other CISA offices, USG partners, and nonfederal partners.
- Maintain a comprehensive understanding of how risk analysis can inform JCDC Planning Office efforts.
- Identify and collect requirements to support the development of roadmaps, strategies, or plans for analytic tools, software, and platforms.
- Support the development of methodologies, policies, and procedures for assessing the risk reduction impact of the government customer.
- Identify existing information and production efforts on cyber threats, vulnerabilities, and consequences.
- Prepare recommendations to fill analytic gaps and support risk prioritization.
- Provide data science expertise to support data integration efforts.
- Coordinate with CISA Intel and IC partners, including DHS Intelligence and Analysis, to incorporate intelligence into JCDC plans.
- Monitor intelligence products for relevance to cyber defense operations and develop recommendations for incorporating this intelligence into cyber defense plans and operations
Qualifications
- Bachelor’s degree in Cyber Security, Information systems, Information Technology, or other related discipline
- Minimum of 8 years of experience using cyber threat intelligence and cyber vulnerability data to develop cyber risk analyses that inform organizational prioritization and cyber operations.
- This experience must demonstrate proficiency in understanding how to use various data sets and sources of information to develop a defensible and repeatable risk analysis methodology.