As illustrated below, the homeland security jobs available as an intelligence analyst involve every Department of Homeland Security department and aspect of online security operations.
Cyber Threat Intelligence Analyst
Cyber threat intelligence analysts are collectively responsible for submitting intelligence reports that identify threats, reduce risks and quantify vulnerabilities. They are often assigned to teams that monitor specific cyber threats or internal systems. They regularly produce concise actionable information and customized analytical reports that are used to prevent threats. Intelligence analysts have a background in information security, processes and strategies.
They apply analytical standards while also remaining open to non-traditional methods and conclusions. These analysts proactively begin cyber intelligence analysis activities according to established intelligence priorities and protocols. They leverage and expand the capacities of existing tools and technologies and advocate for new technologies as needed. They must always maintain a high state of situational awareness regarding emergent threats.
Incident Response Analyst
Incident response analysts have broad functions that support security and defense functions and positions. They respond to cyber intrusions and data breaches through forensic analysis and reporting. They work closely with systems engineers, infrastructure support and response support technicians. Together, these IT professionals complete inspection, detection, certification and vulnerability management duties.
Senior incident response analysts execute policies and procedures and provide technical and functional guidance. They have strong experience in network defense and information assurance. They also maintain awareness of typical attack vectors, system vulnerabilities and network threat life-cycles. They apply malware analysis techniques and advanced statistics to identify and assess malicious software. Incident response analysts are required to maintain industry standard certifications.
Security Analyst
Security analysts work with incident responders and network security monitors to maintain network security integrity. They use the latest technology to detect and limit security events and intrusions through methodically observing and responding to security incidents. They maintain security records of activities through case management and ticketing technologies. To accomplish this, they use intrusion detection and event management systems to identify security issues for remediation.
Security analysts reconstruct both successful and unsuccessful intrusion attempts for training and awareness purposes. To do this, they deconstruct malware and virus programs to highly system and network vulnerabilities. When incidents occur, they communicate alerts to various parties and implement controls and counter-measures. They create and maintain standard operating procedures and tutorials for end-users.
NSA Intelligence Analyst
NSA intelligence analysts use multiple tools and databases to evaluate target subjects. They research individual targets to understand how they operate and fit into national security and geo-political contexts. They work independently with fellow intelligence employees and also collaboratively with other analysts in the intelligence community. They craft written assessments of foreign targets and intelligence that provide unique insight into intentions and potentials plans.
NSA intelligence analysts perform many types of analytical tasks, such as researching foreign sources of intelligence, developing query strategies and assessing the validity of information gathered. They generate detailed reports that profile foreign targets and their suspected activities. Most intelligence analysts have a caseload of high profile targets that they monitor for behavioral changes or environmental anomalies.
Related Resource: Homeland Security Jobs are in Bioterrorism
Students have more homeland security jobs available as an intelligence analyst through becoming a geospatial analyst, cybersecurity technician and system vulnerability analyst.