RiVidium Configuration Management Job Application

Applying for a Position



Target Network Analyst - Intermediate

Return to the jobs search page

Requisition #: AN-TGT-002-2 (NCR)

Job Title: Target Network Analyst - Intermediate

Job Description:

LOCATION:  National Capital Region - Washington, DC or Northern Virginia




Conducts advanced analysis of collection and open-source data to ensure target continuity; to profile targets and their activities; and develop techniques to gain more target information. Determines how targets communicate, move, operate and live based on knowledge of target technologies, digital networks and the applications on them.


  • Provide expertise to course of action development.
  • Classify documents in accordance with classification guidelines.
  • Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas.
  • Compile, integrate, and/or interpret all-source data for intelligence or vulnerability value with respect to specific targets.
  • Identify and conduct analysis of target communications to identify information essential to support operations.
  • Conduct nodal analysis.
  • Conduct quality control to determine validity and relevance of information gathered about networks.
  • Conduct target research and analysis.
  • Determine what technologies are used by a given target.
  • Apply analytic techniques to gain more target information.
  • Generate and evaluate the effectiveness of network analysis strategies.
  • Gather information about networks through traditional and alternative techniques, (e.g., social network analysis, call-chaining, traffic analysis.)
  • Generate requests for information.
  • Identify and evaluate threat critical capabilities, requirements, and vulnerabilities.
  • Identify collection gaps and potential collection strategies against targets.
  • Identify network components and their functionality to enable analysis and target development.
  • Make recommendations to guide collection in support of customer requirements.
  • Provide subject matter expertise to development of exercises.
  • Perform content and/or metadata analysis to meet organization objectives.
  • Profile targets and their activities.
  • Provide target recommendations which meet leadership objectives.
  • Review appropriate information sources to determine validity and relevance of information gathered.
  • Reconstruct networks in diagram or report format.
  • Research communications trends in emerging technologies (in computer and telephony networks, satellite, cable, and wireless) in both open and classified sources.


  • Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
  • Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
  • Ability to clearly articulate intelligence requirements into well formulated research questions and requests for information.
  • Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
  • Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.
  • Ability to exercise judgment when policies are not well-defined.
  • Ability to focus research efforts to meet the customer’s decision making needs.
  • Ability to function effectively in a dynamic, fast-paced environment.
  • Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise.
  • Ability to identify intelligence gaps.
  • Ability to recognize and mitigate cognitive biases which may affect analysis.
  • Ability to recognize and mitigate deception in reporting and analysis.
  • Ability to think critically.
  • Ability to utilize multiple intelligence sources across all intelligence disciplines.


Bachelor degree or higher from an accredited college or university

Prefer an accredited Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering degree; or a degree in a Mathematics or Engineering field.


IAT Level 2 and Two Penetration Testing Certifications (e.g., GPEN, GWAT, GCIH, CEH, GPYC, LPT, CPT)


Please fill out the short application form below. If you have applied for a position with RiVidium in the past, we will know by querying your email address within our database once you submit the form. At that time we will ask you if you would like to use the resume we have on file to apply for the position described above. You will also have the option to submit a new resume if you wish to do so.

Please fill out application

  • select
    Please enter the chararacters

Back to the Top