Targeting Analyst - CI Targeting Cell Support with Security Clearance Community, Social Services & Nonprofit - Honolulu, HI at Geebo

Targeting Analyst - CI Targeting Cell Support with Security Clearance

Mission :
INSCOM ACIC Location :
Hickam AFB, Hawaii Position Summary Seeking experienced Targeting Analysts to support counterintelligence targetingThis position will develop CI leads, based on the Group Synchronization Targeting Strategy, through open-source and classified source research; Develop targets and target systems for joint lethal and / or non-lethal engagements; Develop target nominations, create database records, and database target intelligence products; Produce all-source analytic damage estimates and battle damage assessments and assists with combat assessment requirementsAdditionally, this role conducts collateral damage estimation, performs target list management, target strategy development, and provides joint target intelligence support to deliberate and dynamic target engagementsPrincipal Responsibilities o Provide recommendations for target prioritization to achieve commander objectives for plans and operationso Provide database nominations, creates and updates database and uploads TMs into databases.o Provide the leads to the Targeting Review Board (TRB) as a Target Nomination Packageo Prepare and provide to the supported element Lead Tenders, Operational Support Packages, Program Profiles, and Target Development Packages as appropriate to highlight the operational potential where friendly and enemy elements intersect.o Provide research, analysis and recommendations regarding liaison efforts with operational and support elements, external intelligence agencies, and external federal law enforcement elements to foster an environment of cooperation and sharing of information to better develop future productso Provide CI targeting methodologies training at the Fundamentals of Human Targeting Course (FHTC).o Develop CI High Value Individuals (HVIs), based on the S2 and Command Group priorities, through open-source and classified source research.o Provide specialized expertise in qualitative and quantitative analysis to provide an analytically derived, empirically supported, quantitative basis for decisions regarding targeting and other options to enhance the operational effectiveness of network attack effortso Participate in production, indications and warning, targeting, imagery, network analysis, counterintelligence, information operations, foreign disclosure, international engagements and threat analysisThe contractor shall initiate and conduct research efforts; plan, coordinate, and synthesize research to produce all source intelligence products/responses.o Provide research, analysis and recommendations regarding liaison efforts with operational and support elements, external intelligence agencies, and external federal law enforcement elements to foster an environment of cooperation and sharing of information to better develop future products.o Provide specialized expertise in qualitative and quantitative analysis to provide an analytically derived, empirically supported, quantitative basis for decisions regarding targeting and other options to enhance the operational effectiveness of network attack efforts. Recommended Skills Analytical Assessments Databases Friendliness Implement Projects Open Source Technology Apply to this job. Think you're the perfect candidate? Apply on company site $(document).ready( function() $(#ads-desktop-placeholder).html(
n
n
n Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.