Question
5-10

Cyber Analyst

11/20/2025

The Cyber Analyst will assess the cybersecurity posture of USMC defense programs and analyze foreign capabilities to disrupt USMC emissions. They will also identify risks and evaluate existing databases to address intelligence gaps.

Working Hours

40 hours/week

Company Size

51-200 employees

Language

English

Visa Sponsorship

No

About The Company
Native American Technology Corporation (NATECH) is an award winning, Native American Woman owned-firm and is designated by the Small Business Administration to participate as a Small Disadvantaged Business. NATECH was established by Wanda Williford on July 25, 1999. NATECH has recently self certified under the new SBA 8(m) program as an Economically Disadvantaged Women Owned Business (EDWOSB). NATECH delivers multi-disciplinary professional and technical services to government and private sector customers nationwide. Core capabilities include Project/Program Management, Administration, Engineering, Logistics, Preventive Maintenance, Construction Support, Aviation Safety, Power Systems Design, Install and Maintenance, Business and Financial Solutions, and Environmental Remediation. NATECH is known as a premier teaming partner/subcontractor. We understand the dynamics of teaming and are dedicated to the Prime Contractor's proposal process as well as the delivery of the highest quality product to the customer. During the pre-proposal and proposal process, NATECH is responsive and timely in required submissions, participates in team reviews and provide writers, subject matter experts and quality control input. After award NATECH’s philosophy is that the Prime Contractor is as much of our customer as is the procuring agency. Mary McMillan, former Vice President of CSSI Inc referred to NATECH’s cooperation and responsiveness during a recent winning team effort as “Best in Class” and “Best in Show”. NATECH is an ISO 9001:2008 Quality Management System Certified Company.
About the Role

Description

  

In support of Marine Corps Intelligence Activity (MCIA), NATECH is recruiting for a Cyber Analyst.


Duties and Responsibilities: 

  • Assess the cybersecurity posture of a USMC defense program, ensuring the program is evolving with the best cybersecurity practices, prioritizing cyber threats based on factual cyber analysis.
  • Analyze foreign capabilities to detect, disrupt, and deny USMC emissions and signals throughout the cyber kill chain, to include, but not limited to emissions from targeting, communications, and intelligence, surveillance, and reconnaissance (ISR) assets, reversible and non-reversible attacks.
  • Identify, monitor, and assess advancements in emerging and commercial technologies that could be employed by state and non-state actors to detect, disrupt, and deny USMC acquisition programs’ network infrastructure.
  • Identify significant risk characteristics of the environment such as classification of network, baseline activity, architecture, operating system, services, connectivity and bandwidth.
  • Identify the limits of the network to be collected against.
  • Establish limits of the supporting or connected networks that may need to be collected against.
  • Evaluate existing databases and identify intelligence gaps.
  • Use open source to gather Publicly Available Information (PAI).
  • Explore the physical battlespace; how could the environment affect tactical operations.
  • Define the battlespace effects.
  • Analyze the battlespace environment for information, services and networks, such as confidentiality, integrity, availability; and protect, detect, respond, restore and conduct reviews.
  • Analyze other characteristics of the battlespace such as security, auditing procedures, and backup systems. Evaluate the adversary on physical location of all assets, architecture and automation skills, security and policies, baseline activity, peculiarities and vulnerabilities, capabilities, and conclusions that address: Rules of Engagement (ROE) for Information Assurance (IA), Computer Network Defense (CND) and Computer Network Attack (CNA)
  • Determine adversary’s Courses of Action (COA).
  • Identify the adversary’s likely objectives and desired end state.
  • Identify the full set of COA’s available to the adversary, at a minimum the most likely and most dangerous should be developed.
  • Develop COA’s based on enemy perception of friendly information architecture (reverse cyber IPB).
  • Evaluate and prioritize each adversary COA.
  • Continue to refine COA’s as time and new information allow.
  • Evaluate foreign Computer Network Defense (CND) and Computer Network Attack (CNA) capabilities, limitations, and vulnerabilities.
  • Assess potential vulnerabilities of USMC tactical systems to CNA to include systems related to targeting, ISR, and navigation assets.

Requirements

 

  • Must possess an active TS SCI clearance
  • Must have relevant and demonstrated experience.
  • Knowledgeable of and demonstrates ability to apply Intelligence Community (IC) and DoD classification guidelines and procedures.
  • Demonstrates ability to work semi-independently with oversight and direction.
  • Demonstrates ability to use logic when evaluating and synthesizing multiple sources of information. 
  • Demonstrates understanding of interpreting analysis to include, but not limited to, its meaning, importance, and implications. 
  • Demonstrates ability to defend analytic judgements with sound, logical conclusions and adapt analytic judgments when presented with new information, evolving conditions, or unexpected developments.
  • Demonstrates ability to produce timely, logical, and concise analytic reports, documents, assessments, studies, and briefing materials in formats including Microsoft Office tools (e.g. Excel, Word, PowerPoint, etc.), electronic/ soft copy matrices and / or web-enabled formats.
  • Demonstrates ability to communicate complex issues clearly in a concise and organized manner both verbally and non-verbally; with strong grammar skills. Demonstrates proficiency using Microsoft Office tools.
  • Demonstrates ability to develop structured research including, but not limited to, obtaining, evaluating, organizing, and maintaining information within security and data protocols.
  • Demonstrates ability to recognize nuances and resolve contradictions and inconsistencies in information.
  • Demonstrates working knowledge using complex analytic methodologies, such as structured analytic techniques or alternative approaches. to examine biases, assumptions, and theories to eliminate uncertainty, strengthen analytic arguments, and mitigate surprise. Structured analytic techniques include, but not limited to, Analysis of Competing Hypotheses, Devil's Advocacy, High-Impact/ Low-Impact Analysis, Red Team Analysis and Alternative Futures Analysis.
  • Demonstrates understanding of intelligence collection capabilities and limitations, to include but not limited to, technical sensors / platforms and human intelligence sources.
  • Demonstrates understanding of evaluating collected intelligence reporting, engaging with collection managers, and developing collection requirements.
Key Skills
CybersecurityCyber Threat AnalysisIntelligence AnalysisAnalytic MethodologiesMicrosoft OfficePublicly Available InformationNetwork SecurityRisk AssessmentAdversary AnalysisCourses of ActionData ProtocolsInformation AssuranceComputer Network DefenseComputer Network AttackEmerging TechnologiesTactical Operations
Categories
TechnologyGovernment & Public SectorSecurity & SafetyData & AnalyticsEngineering
Apply Now

Please let Native American Technology know you found this job on InterviewPal. This helps us grow!

Apply Now
Prepare for Your Interview

We scan and aggregate real interview questions reported by candidates across thousands of companies. This role already has a tailored question set waiting for you.

Elevate your application

Generate a resume, cover letter, or prepare with our AI mock interviewer tailored to this job's requirements.