Threat Intelligence Analyst

PeratonAshburn, VA
1d$80,000 - $128,000

About The Position

Peraton is seeking a Threat Intelligence Analyst to support U.S. Customs and Border Protection (CBP) by analyzing and integrating data from open-source, commercial, government, and technical sources to identify and assess threats impacting CBP missions, systems, and personnel. This position performs all-source intelligence analysis and produces actionable intelligence products that support CBP operational awareness, investigative efforts, and strategic decision-making. Support will be provided across multiple mission locations: Ashburn, VA Sterling, VA Washington, D.C.

Requirements

  • 5 years with BS/BA; 3 years with MS/MA. 9 years with a HS diploma/equivalent can be considered in lieu of a degree.
  • 2+ years of experience in all-source intelligence analysis, threat intelligence, or related analytical roles.
  • Experience conducting all-source analysis using open-source, commercial, or government intelligence data.
  • Demonstrated experience producing analytic reports, intelligence summaries, or briefings.
  • Experience using intelligence analysis tools or analytic platforms (e.g., Palantir, i2 Analyst’s Notebook, Maltego, or similar tools).
  • Familiarity with data visualization tools such as Power BI or Tableau.
  • Basic working knowledge of data analysis tools such as Python, R, or SQL is desirable.
  • Strong analytical thinking, writing, and communication skills.
  • Understanding of legal, privacy, and ethical considerations in intelligence analysis.
  • Active TS/SCI clearance
  • Ability to obtain and maintain CBP (BI) suitability
  • U.S. Citizenship required

Nice To Haves

  • Academic background in Intelligence Studies, International Relations, Data Science, Computer Science, Criminal Justice, or related field.
  • Experience supporting DHS, CBP, or other federal law enforcement or intelligence organizations.
  • Familiarity with MITRE ATT&CK framework or adversary TTP analysis.
  • Experience with link analysis, network analysis, or entity resolution techniques.
  • Exposure to cyber threat intelligence, protective intelligence, or transnational crime analysis.
  • Certifications such as Security+, GCTI, ISC2 CC/SSCP, or relevant intelligence or cybersecurity certifications.
  • Exposure to cloud-based analytic environments (AWS, Azure, or GCP).

Responsibilities

  • Conduct all-source threat analysis by integrating open-source, commercial, government, and technical data to identify emerging threats and potential risks.
  • Produce intelligence summaries, threat assessments, and analytic reports supporting CBP operational and mission priorities.
  • Apply structured analytic techniques to evaluate information and support the development of Indications & Warning (I&W) products.
  • Analyze adversary tactics, techniques, and patterns related to transnational crime, cyber-enabled threats, foreign influence, and protective security concerns.
  • Use analytic tools such as Palantir, i2 Analyst’s Notebook, Maltego, Power BI, or Tableau to conduct investigations and visualize intelligence findings.
  • Support data analysis and enrichment efforts using tools such as Python, R, or SQL where applicable.
  • Conduct link analysis, network analysis, and pattern analysis to identify relationships between individuals, organizations, and activities of interest.
  • Monitor open-source reporting, intelligence feeds, and technical data sources to identify developments relevant to CBP operations and personnel safety.
  • Collaborate with analysts, engineers, and mission stakeholders to produce timely, mission-relevant intelligence products.
  • Ensure intelligence activities comply with CBP/DHS legal, privacy, and governance requirements.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service