drjobs Biometrics Imagery Analyst II

Biometrics Imagery Analyst II

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Quantico, VA - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Job Title: Biometrics Imagery Analyst II
Location: Quantico
Clearance:TS/SCI
Employment Type: Full Time contingent on contract award
Primary Duties:
  • Conduct MULTIINT triage research exploitation organization prioritization analysis production and dissemination in accordance with (IAW) Government priorities policies and Standard Operating Procedures (SOP).
  • Provide expertise to provide support in all facets of I2 analysis including but not limited to triage research exploitation analysis production and dissemination of Biometric Forensic Face & Image Analysis Cellular Exploitation (CELLEX) Document and Media Exploitation (DOMEX) derived products and I2 training.
  • Develop products to include but not be limited to finished intelligence biometric/biographicrelated analysis reports SIGINT or CELLEXrelated analysis reports DOMEX derived reports Allsource analysis reports analytic briefings RFI responses similar products training material or future developed analytical products.
  • Exploit identityrelated information allsource/multiintelligence information cellularderived information and Signals Intelligence (SIGINT) in order to extract additional information using advanced analytic tools and methods to produce AllSource intelligence products up to a 24/7/365366 shift environment.
  • Utilize DONISIS BI2R or any other additional or future systems or repositories for research and exploitation.
  • Ensure information contained within reports is intelligible cogent comprehensive understandable and proper syntax formatting and classifications are provided.
  • Demonstrate working knowledge and apply Identity Intelligence technical subject matter expertise of Electronic Fingerprint Transaction (EFT) files Originating Identifiers (ORIs) Transaction Control Numbers (TCNs) Biometric Identifiers (BIDs) and other I2 biometricrelated information.
  • Provide up to 24/7/365366 support for the management of DoD BiometricEnabled Watchlist (BEWL) and National Level Watchlisting operations to include but not limited to: encounter management; nomination support change requests removal requests; RFIs; and/or other future BEWL or other Watchlisting type products at the DoD and National Levels.
  • Triage research exploit analyze produce and disseminate I2 information to support national level watchlisting in order to operationalize the output of biometric or forensicenabled intelligence (BEI/FEI) and identity intelligence (I2 derived data to fulfill the DoD component of Homeland Security Presidential Directives 6 11 and 24.
  • Coordinate reachback I2 support for deployed forces and perform supporting tasks to successfully execute the I2 mission.
  • Provide tactical operational and nationallevel I2 support to all conventional USMC forces as well as Government approved partner forces.
  • Provide up to 24/7/365366 I2 support to all CONUS and OCONUS operations.
  • Manage/exploit I2 information using tools including but not limited to Microsoft Office Suite tools and databases.
  • Perform case management for all Department of Navy Identification and Screening Information System (DONISIS) submissions.
  • Monitor all shared inboxes on all required networks and forward pertinent emails to the appropriate Identity Intelligence Analysis Cell (I2AC) leadership. Coordinate with other organizations including but not limited to Data Forensics and Biometrics Agency (DFBA) National Ground Intelligence Center (NGIC) Naval Criminal Investigative Service (NCIS) and FBI Special Investigative Unit (SIU).
  • Apply forensics methodologies and analytical processes to identify extract exploit and disseminate I2 information from documents and media seized during military operations.
  • Extract facial images from media for further exploitation.
  • Establish a process for continually improving the selection and prioritization of files/documents to identify those with high potential foryielding relevant information.
  • Establish and maintain a record of documents reviewed.
  • Assess identity attributes contained in images and videos in order to achieve identity resolution for persons of interest to USMC and partner forces.
  • Conduct tasks to include but not limited to 1:N searches 1:1 comparisons image optimization image/video authentication metadata analysis identifying geolocations.
  • Conduct open source and classified research for highquality images & videos.
  • Utilize facial recognition enabled software and databases.
  • Maintain collaborative relationships with other Facial Identification (FI) enabled organizations and leverage their expertise.
  • Produce and disseminate Facial Comparison Analysis Reports (FCAR) or Media Exploitation (MEDEX) Rollups.
  • Shift work start and end times will be at discretion of I2 Branch supervisors/leadership

Qualifications:
  • Demonstrates working knowledge of the concepts involved in the specific functions outlined in the job duties.
  • Knowledgeable of and demonstrates ability to apply IC and DoD classification guidelines and procedures.
  • Demonstrates ability to work semiindependently with oversight and direction.
  • Demonstrates ability to use logic when evaluating and synthesizing multiple sources of information.
  • Demonstrates understanding of interpreting analysis to include but not limited to its meaning importance and implications.
  • Demonstrates ability to defend analytic judgements with sound logical conclusions and adapt analytic judgments when presented with new information evolving conditions or unexpected developments.
  • Demonstrates ability to produce timely logical and concise analytic reports documents assessments studies and briefing materials in formats including Microsoft Office tools (e.g. Excel Word PowerPoint etc. electronic / soft copy matrices and / or webenabled formats.
  • Demonstrates ability to communicate complex issues clearly in a concise and organized manner both verbally and nonverbally; with strong grammar skills.
  • Demonstrates proficiency using Microsoft Office tools.
  • Demonstrates ability to develop structured research including but not limited to obtaining evaluating organizing and maintaining information within security and data protocols.
  • Demonstrates ability to recognize nuances and resolve contradictions and inconsistencies in information.
  • Demonstrates working knowledge using complex analytic methodologies such as structured analytic techniques or alternative approaches to examine biases assumptions and theories to eliminate uncertainty strengthen analytic arguments and mitigate surprise. Structured analytic techniques include but not limited to Analysis of Competing Hypotheses Devils Advocacy HighImpact / LowImpact Analysis Red Team Analysis and Alternative Futures Analysis.
  • Demonstrates understanding of intelligence collection capabilities and limitations to include but not limited to technical sensors / platforms and human intelligence sources
  • Demonstrates understanding of evaluating collected intelligence reporting engaging with collection managers and developing collection requirements.
  • Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category.
  • Demonstrates ability to communicate understanding from information that may be incomplete indirect highly complex seemingly unrelated and / or technically advanced.
  • Demonstrates ability to structure analysis based on trends in reporting and a range of analytic perspectives from other analysts organizations and intelligence disciplines.
  • Demonstrates ability to work independently with minimal oversight and direction.
  • Demonstrates ability to collaborate and work with other IC members on information sharing driving collection and addressing analytic disputes and conflict resolution.
  • Demonstrates ability to develop concise insightful and comprehensive products for defense intelligence.
  • Demonstrates ability to lead teams in researching multifaceted or critical problems. Provides guidance in selecting designing and applying analytic methodologies. Uses argument evaluation and validated analytic methodologies to challenge differing perspectives.
Education:
Required Experience: Minimum 3 years of experience conducting relevant analysis with at least a portion of the experience within the last 2 years.

Required Education: Bachelors degree in a related field from a college or university accredited by an agency recognized by the U.S. Department of Education. An additional 4 years of experience for a total of 7 years of experience in the specific labor category may be substituted for a Bachelors degree.

This fulltime position is Monday through Friday and operates in a professional office environment. This role routinely uses standard office equipment such as computers phones photocopiers filing cabinets and fax machines. Limited travel may be required.
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this position.
  • While performing the duties of this position the employee is regularly required to talk or hear.
  • The employee frequently is required to stand; walk; use hands to finger handle or feel; and reach with hands and arms.
  • This position requires the ability to occasionally lift office products and supplies up to 20 pounds.

Required Experience:

IC

Employment Type

Full Time

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.