RiVidium Configuration Management Job Application

Applying for a Position



All-Source Analyst - Intermediate

Return to the jobs search page

Requisition #: AN-ASA-001-2 (NCR)

Job Title: All-Source Analyst - Intermediate

Job Description:

LOCATION:  National Capital Region - Washington, DC or Northern Virginia




Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations


  • Perform file signature analysis.
  • Perform real-time forensic analysis (e.g., using Helix in conjunction with LiveView).
  • Answer requests for information.
  • Provide expertise to course of action development.
  • Provide subject matter expertise to the development of a common operational picture.
  • Maintain a common intelligence picture.
  • Provide subject matter expertise to the development of cyber operations specific indicators.
  • Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.
  • Assist in the identification of intelligence collection shortfalls.
  • Brief threat and/or target current situations.
  • Collaborate with intelligence analysts/targeting organizations involved in related areas.
  • Conduct in-depth research and analysis.
  • Conduct nodal analysis.
  • Maintain awareness of internal and external cyber organization structures, strengths, and employments of staffing and technology.
  • Develop information requirements necessary for answering priority information requests.
  • Engage customers to understand customers' intelligence needs and wants.
  • Evaluate threat decision-making processes.
  • Identify threat vulnerabilities.

  • Identify threats to Blue Force vulnerabilities.

  • Generate requests for information.

  • Identify threat tactics, and methodologies.

  • Identify and evaluate threat critical capabilities, requirements, and vulnerabilities.

    Identify and submit intelligence requirements for the purposes of designating priority information requirements.

  • Identify intelligence gaps and shortfalls.

  • Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets.

  • Monitor and report on validated threat activities.

  • Monitor open source websites for hostile content directed towards organizational or partner interests.


  • Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
  • Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
  • Ability to clearly articulate intelligence requirements into well formulated research questions and data tracking variables for inquiry tracking purposes.
  • Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
  • Ability to effectively collaborate via virtual teams.
  • Ability to evaluate information for reliability, validity, and relevance.
  • Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.
  • Ability to exercise judgment when policies are not well-defined.
  • Ability to focus research efforts to meet the customer’s decision making needs.
  • Ability to function effectively in a dynamic, fast-paced environment.
  • Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise.
  • Ability to identify intelligence gaps.
  • Ability to recognize and mitigate cognitive biases which may affect analysis.
  • Ability to recognize and mitigate deception in reporting and analysis.
  • Ability to think critically.
  • Ability to think like threat actors.
  • Ability to understand objectives and effects.
  • Ability to utilize multiple intelligence sources across all intelligence disciplines.


Bachelor degree or higher from an accredited college or university

Prefer an accredited Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering degree; or a degree in a Mathematics or Engineering field.


IAT Level 2


Please fill out the short application form below. If you have applied for a position with RiVidium in the past, we will know by querying your email address within our database once you submit the form. At that time we will ask you if you would like to use the resume we have on file to apply for the position described above. You will also have the option to submit a new resume if you wish to do so.

Please fill out application

  • select
    Please enter the chararacters

Back to the Top