Yesterday
Unspecified
Mid Level Career (5+ yrs experience)
$130,000
IT - Security
Data Analyst (Senior)
KEY FUNCTIONS
i. Examines data from multiple disparate sources with the goal of providing security and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.
REQUIREMENTS:
i. Must be a US Citizen
ii. Seven(7) + years of relevant cyber-security experience and an advanced degree in a technical/cyber-related field. Direct experience or directly relevant certifications may substitute for the academic credentials.
SELECTED RESPONSIBILITIES
i. Analyze and define data requirements and specifications.
ii. Analyze data sources to provide actionable recommendations.
iii. Assess the validity of source data and subsequent findings.
iv. Collect metrics and trending data.
v. Conduct hypothesis testing using statistical processes.
vi. Confer with systems analysts, engineers, programmers, and others to design application.
vii. Develop and facilitate data-gathering methods.
viii. Develop and implement data mining and data warehousing programs.
ix. Develop data standards, policies, and procedures.
x. Develop strategic insights from large data sets.
xi. Effectively allocate storage capacity in the design of data management systems.
xii. Present data in creative formats.
xiii. Present technical information to technical and nontechnical audiences.
xiv. Program custom algorithms.
xv. Provide a managed flow of relevant information (via web-based portals or other means) based on mission requirements.
xvi. Provide actionable recommendations to critical stakeholders based on data analysis and findings.
xvii. Read, interpret, write, modify, and execute simple scripts (e.g., Perl, VBScript) on Windows and UNIX systems (e.g., those that perform tasks such as: parsing large data files, automating manual tasks, and fetching/processing remote data).
xviii. Utilize different programming languages to write code, open files, read files, and write output to different files.
xix. Utilize open source language such as R and apply quantitative techniques (e.g., descriptive and inferential statistics, sampling, experimental design, parametric and non-parametric tests of difference, ordinary least squares regression, general line).
xx. Utilize technical documentation or resources to implement a new mathematical, data science, or computer science method.
xxi. Analyze and plan for anticipated changes in data capacity requirements.
xxii. Manage the compilation, cataloging, caching, distribution, and retrieval of data.
xxiii. Provide recommendations on new database technologies and architectures.
SKILLS
i. Skill in assessing the predictive power and subsequent generalizability of a model.
ii. Skill in creating and utilizing mathematical or statistical models.
iii. Skill in data mining techniques (e.g., searching file systems) and analysis.
iv. Skill in data pre-processing (e.g., imputation, dimensionality reduction, normalization, transformation, extraction, filtering, smoothing).
v. Skill in developing data dictionaries.
vi. Skill in developing data models.
vii. Skill in developing machine understandable semantic ontologies.
viii. Skill in identifying common encoding techniques (e.g., Exclusive Disjunction [XOR], American Standard Code for Information Interchange [ASCII], Unicode, Base64, Uuencode, Uniform Resource Locator [URL] encode).
ix. Skill in identifying hidden patterns or relationships.
x. Skill in one-way hash functions (e.g., Secure Hash Algorithm [SHA], Message Digest Algorithm [MD5]).
xi. Skill in performing format conversions to create a standard representation of the data.
xii. Skill in performing sensitivity analysis.
xiii. Skill in reading Hexadecimal data.
xiv. Skill in Regression Analysis (e.g., Hierarchical Stepwise, Generalized Linear Model, Ordinary Least Squares, Tree-Based Methods, Logistic).
xv. Skill in the use of design modeling (e.g., unified modeling language).
xvi. Skill in transformation analytics (e.g., aggregation, enrichment, processing).
xvii. Skill in using basic descriptive statistics and techniques (e.g., normality, model distribution, scatter plots).
xviii. Skill in using binary analysis tools (e.g., Hexedit, command code xxd, hexdump).
xix. Skill in using data analysis tools (e.g., Excel, STATA SAS, SPSS).
xx. Skill in using data mapping tools.
xxi. Skill in using outlier identification and removal techniques.
xxii. Skill in writing scripts using R, Python, PIG, HIVE, SQL, etc.
xxiii. Skill to identify sources, characteristics, and uses of the organization’s data assets.
xxiv. Skill in conducting queries and developing algorithms to analyze data structures.
xxv. Skill in generating queries and reports.
xxvi. Skill in writing code in a currently supported programming language (e.g., Java, C++).
REQUIRED ABILITIES
i. Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
ii. Ability to build complex data structures and high-level programming languages.
iii. Ability to dissect a problem and examine the interrelationships between data that may appear unrelated.
iv. Ability to identify basic common coding flaws at a high level.
v. Ability to use data visualization tools (e.g., Flare, HighCharts, AmCharts, D3.js, Processing, Google Visualization API, Tableau, Raphael.js).
REQUIRED KNOWLEDGE
i. Knowledge of advanced data remediation security features in databases.
ii. Knowledge of applications that can log errors, exceptions, and application faults and logging.
iii. Knowledge of command-line tools (e.g., mkdir, mv, ls, passwd, grep).
iv. Knowledge of computer algorithms.
v. Knowledge of computer programming principles
vi. Knowledge of data administration and data standardization policies.
vii. Knowledge of data mining and data warehousing principles.
viii. Knowledge of database access application programming interfaces (e.g., Java Database Connectivity [JDBC]).
ix. Knowledge of database management systems, query languages, table relationships, and views.
x. Knowledge of database theory.
xi. Knowledge of digital rights management.
xii. Knowledge of enterprise messaging systems and associated software.
xiii. Knowledge of how to utilize Hadoop, Java, Python, SQL, Hive, and Pig to explore data.
xiv. Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression).
xv. Knowledge of interpreted and compiled computer languages.
xvi. Knowledge of low-level computer languages (e.g., assembly languages).
xvii. Knowledge of machine learning theory and principles.
xviii. Knowledge of mathematics (e.g. logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis).
xix. Knowledge of policy-based and risk adaptive access controls.
xx. Knowledge of programming language structures and logic.
xxi. Knowledge of query languages such as SQL (structured query language).
xxii. Knowledge of secure coding techniques.
xxiii. Knowledge of sources, characteristics, and uses of the organization’s data assets.
xxiv. Knowledge of the capabilities and functionality associated with various technologies for organizing and managing information (e.g., databases, bookmarking engines).
xxv. Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).
xxvi. Knowledge of operating systems.
xxvii. Knowledge of computer networking concepts and protocols, and network security methodologies.
xxviii. Knowledge of cyber threats and vulnerabilities.
xxix. Knowledge of cybersecurity and privacy principles.
xxx. Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
xxxi. Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
xxxii. Knowledge of specific operational impacts of cybersecurity lapses.
KEY FUNCTIONS
i. Examines data from multiple disparate sources with the goal of providing security and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.
REQUIREMENTS:
i. Must be a US Citizen
ii. Seven(7) + years of relevant cyber-security experience and an advanced degree in a technical/cyber-related field. Direct experience or directly relevant certifications may substitute for the academic credentials.
SELECTED RESPONSIBILITIES
i. Analyze and define data requirements and specifications.
ii. Analyze data sources to provide actionable recommendations.
iii. Assess the validity of source data and subsequent findings.
iv. Collect metrics and trending data.
v. Conduct hypothesis testing using statistical processes.
vi. Confer with systems analysts, engineers, programmers, and others to design application.
vii. Develop and facilitate data-gathering methods.
viii. Develop and implement data mining and data warehousing programs.
ix. Develop data standards, policies, and procedures.
x. Develop strategic insights from large data sets.
xi. Effectively allocate storage capacity in the design of data management systems.
xii. Present data in creative formats.
xiii. Present technical information to technical and nontechnical audiences.
xiv. Program custom algorithms.
xv. Provide a managed flow of relevant information (via web-based portals or other means) based on mission requirements.
xvi. Provide actionable recommendations to critical stakeholders based on data analysis and findings.
xvii. Read, interpret, write, modify, and execute simple scripts (e.g., Perl, VBScript) on Windows and UNIX systems (e.g., those that perform tasks such as: parsing large data files, automating manual tasks, and fetching/processing remote data).
xviii. Utilize different programming languages to write code, open files, read files, and write output to different files.
xix. Utilize open source language such as R and apply quantitative techniques (e.g., descriptive and inferential statistics, sampling, experimental design, parametric and non-parametric tests of difference, ordinary least squares regression, general line).
xx. Utilize technical documentation or resources to implement a new mathematical, data science, or computer science method.
xxi. Analyze and plan for anticipated changes in data capacity requirements.
xxii. Manage the compilation, cataloging, caching, distribution, and retrieval of data.
xxiii. Provide recommendations on new database technologies and architectures.
SKILLS
i. Skill in assessing the predictive power and subsequent generalizability of a model.
ii. Skill in creating and utilizing mathematical or statistical models.
iii. Skill in data mining techniques (e.g., searching file systems) and analysis.
iv. Skill in data pre-processing (e.g., imputation, dimensionality reduction, normalization, transformation, extraction, filtering, smoothing).
v. Skill in developing data dictionaries.
vi. Skill in developing data models.
vii. Skill in developing machine understandable semantic ontologies.
viii. Skill in identifying common encoding techniques (e.g., Exclusive Disjunction [XOR], American Standard Code for Information Interchange [ASCII], Unicode, Base64, Uuencode, Uniform Resource Locator [URL] encode).
ix. Skill in identifying hidden patterns or relationships.
x. Skill in one-way hash functions (e.g., Secure Hash Algorithm [SHA], Message Digest Algorithm [MD5]).
xi. Skill in performing format conversions to create a standard representation of the data.
xii. Skill in performing sensitivity analysis.
xiii. Skill in reading Hexadecimal data.
xiv. Skill in Regression Analysis (e.g., Hierarchical Stepwise, Generalized Linear Model, Ordinary Least Squares, Tree-Based Methods, Logistic).
xv. Skill in the use of design modeling (e.g., unified modeling language).
xvi. Skill in transformation analytics (e.g., aggregation, enrichment, processing).
xvii. Skill in using basic descriptive statistics and techniques (e.g., normality, model distribution, scatter plots).
xviii. Skill in using binary analysis tools (e.g., Hexedit, command code xxd, hexdump).
xix. Skill in using data analysis tools (e.g., Excel, STATA SAS, SPSS).
xx. Skill in using data mapping tools.
xxi. Skill in using outlier identification and removal techniques.
xxii. Skill in writing scripts using R, Python, PIG, HIVE, SQL, etc.
xxiii. Skill to identify sources, characteristics, and uses of the organization’s data assets.
xxiv. Skill in conducting queries and developing algorithms to analyze data structures.
xxv. Skill in generating queries and reports.
xxvi. Skill in writing code in a currently supported programming language (e.g., Java, C++).
REQUIRED ABILITIES
i. Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
ii. Ability to build complex data structures and high-level programming languages.
iii. Ability to dissect a problem and examine the interrelationships between data that may appear unrelated.
iv. Ability to identify basic common coding flaws at a high level.
v. Ability to use data visualization tools (e.g., Flare, HighCharts, AmCharts, D3.js, Processing, Google Visualization API, Tableau, Raphael.js).
REQUIRED KNOWLEDGE
i. Knowledge of advanced data remediation security features in databases.
ii. Knowledge of applications that can log errors, exceptions, and application faults and logging.
iii. Knowledge of command-line tools (e.g., mkdir, mv, ls, passwd, grep).
iv. Knowledge of computer algorithms.
v. Knowledge of computer programming principles
vi. Knowledge of data administration and data standardization policies.
vii. Knowledge of data mining and data warehousing principles.
viii. Knowledge of database access application programming interfaces (e.g., Java Database Connectivity [JDBC]).
ix. Knowledge of database management systems, query languages, table relationships, and views.
x. Knowledge of database theory.
xi. Knowledge of digital rights management.
xii. Knowledge of enterprise messaging systems and associated software.
xiii. Knowledge of how to utilize Hadoop, Java, Python, SQL, Hive, and Pig to explore data.
xiv. Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression).
xv. Knowledge of interpreted and compiled computer languages.
xvi. Knowledge of low-level computer languages (e.g., assembly languages).
xvii. Knowledge of machine learning theory and principles.
xviii. Knowledge of mathematics (e.g. logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis).
xix. Knowledge of policy-based and risk adaptive access controls.
xx. Knowledge of programming language structures and logic.
xxi. Knowledge of query languages such as SQL (structured query language).
xxii. Knowledge of secure coding techniques.
xxiii. Knowledge of sources, characteristics, and uses of the organization’s data assets.
xxiv. Knowledge of the capabilities and functionality associated with various technologies for organizing and managing information (e.g., databases, bookmarking engines).
xxv. Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).
xxvi. Knowledge of operating systems.
xxvii. Knowledge of computer networking concepts and protocols, and network security methodologies.
xxviii. Knowledge of cyber threats and vulnerabilities.
xxix. Knowledge of cybersecurity and privacy principles.
xxx. Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
xxxi. Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
xxxii. Knowledge of specific operational impacts of cybersecurity lapses.
group id: 90982409