Cyber Operations Analyst/Engineer/DesignerWe are seeking a Cyber Operations Analyst to support a clients Projects by performing operations research, general research, testing and evaluation analysis, mission support analysis and logistics analysis. Serve as a member of the analytic team, helping to implement an overall intelligence support to law enforcement services. Demonstrate continuous efforts to improve operational performance, streamline work processes, and work cooperatively and jointly to provide quality, seamless customer service.This position requires a security clearance which we can help you acquire if you do not have one already and will support our client up to 75% Remotely.Cyber Operations Analyst to provide the following support:Performs operations research tasks of limited scope and difficultyPlans work procedures and selects standard methods and techniques to be applied to development and assessment projects or problems solving studies.Applies the various steps of accepted operations research procedures to search for information to bear on a system, process, and/or operational problem, and performs techniques involving difficult calculations or exact comparability determinations.Perform special research tasks designed to utilize and enhance knowledge of work processes and techniques.Identifies sources of data and performs data acquisition and reduction. Make minor adaptations in techniques or method to achieve the objectives of the assignment.Develops reports which summarize accomplishments and results of assignments and presents findings within own organization. Keep abreast of emerging technologies and professional developments to remain current in the field and for application to work assignments.Other duties may be assignedCyber Operations Analyst position requirements:Certification of Cybersecurity Analyst (CySA+) and/or a Certified Ethical Hacker (CHE).2 + years of general exposure to third party payment methods attributable to phone and computer applications.2 + years expertise current dark and general web hacking methodologies.2 + years of exposure to laws, regulations, polices and ethics as they relate to cybersecurity and privacy.Knowledge of current computer attacking methods and webmail collection searching/analyzing techniques and then the ability to produce a written reports.2 + years of general knowledge of Python and C++ computer coding and IT (Information Technology) network structure.3 + years of recurring exposure to Linux, Mac OS and Microsoft computer operating systems.2 + years of exposure to front-end collection systems including traffic collection, filtering, selection and internet routing protocols.2 + years of familiarity with computer attack methods and techniques of brute force, spoofing etc.2 + years of collecting, viewing, and identify essential information on target(s) of interest from metadata (e.g. email, http, social media).Ability to recognize technical information that may be used in leads to enable remote operation (data includes users, passwords, email addresses, IP ranges of the target, frequency in DNI (Digital Network Intelligence) behavior, mail servers, domain servers and header information) and then make immediate notification to the field in written/email format (weekly).Must communicate complex concepts or ideas in a confident and well-organized manner through verbal, written and/or visual means on a weekly basis.For more information about the company please visit our website at is an Equal Opportunity Employer and does not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, disability or any other federal, state or local protected class.