Job title : Open-Source Intelligence Specialist Job Location : Gauteng, Pretoria Deadline : December 27, 2024 Quick Recommended Links Jobs by Location Job by industries KEY PERFORMANCE AREAS Identify user specifications for the acquisition of technical equipment needed to gather and analyse open-source material relevant to the production of financial intelligence.
Use specialised technology from various sources including crypto asset blockchains, the internet, dark web, deep web, social media platforms and any other place authorised by the FIC to gather the information.
Determine, setup, apply and maintain technical equipment to gather open-source material as directed by the FIC over a short - to long term duration. Deploy suitable measures in the information gathering cycle to ensure FIC is not contravening section 60(1) when executing its functions under section 4 (a) of the Act.
Ensure compliance to relevant legislation when gathering information from open source and blockchains Develop and implement SOPs to gather and analyse open-source material relevant to the production of financial intelligence Analyse data and produce reports that are relevant to the production of timely financial intelligence.
Apply diagnostic ability to see multiple relationships and make multiple causal links to determine the impact of multiple part chains on events in order to formulate a hypothesis.
Produce complex reports which contain possible inferences and conclusions for medium term planning purposes Lead briefings and presentations with internal and external FIC stakeholders and clients Disseminate information requested (once it has been approved) as per agreed timelines and specifications.
Ensure aggregation and utilisation of relevant technical equipment Perform quality assurance tests for ensuring data integrity and quality. Resolve technical equipment's problems, queries and error reports in an accurate and timely manner Review the production of technical assessments or forecasts from open-source information and blockchain platforms concerning AML/CFT or proceeds of crime.
Perform technical surveillance countermeasures for the FIC.
Support information gathering requirements within the department Act as a lead assigning and reviewing work to others Conduct training as and when required Perform any other ad hoc duties as assigned EDUCATION, SKILLS AND EXPERIENCE University Degree with specialisation in Computer or Digital Forensics.
Working towards Postgraduate qualification in a related field such as computer science, information technology, cybersecurity, public management or criminal justice will be advantageous.
Six years' experience in cybercrime or cybersecurity investigations relevant field.
Six years' experience with intelligence analysis tools, methods and the intelligence life cycle Skills and knowledge on Blockchain, an Ethereum Java or Python Developer Proven ability to understand and explain the behaviours of different types of complex organisations, from criminal syndicates to financial enterprises.
Certifications in intelligence analysis or specific OSINT tools (i2 Analyst Notebook, i2 Base Essentials, Maltego or TRM Labs) will be advantageous Proven ability to translate complex information sets into specific recommendations that can be actioned by customers to enhance their financial intelligence operations.
Familiarity with cyber threats, defences, motivations and techniques.
Understanding of cybersecurity principles, threats, and defences, especially related to blockchain applications.
Must have advanced skills to deploy Open-Source technology from Open-Source Software Platforms (Linux).
Must have the ability to conduct thorough online research and evaluate the credibility of information sources.
Must be able to lead a team through project management techniques.
Cyber Security - Understand different operating systems and network security concepts.
Internet capabilities - Understand Domain Name Services (DNS), Transmission.
Control Protocols over the Internet Protocol (TCP/IP), Small Mail Transfer Protocol (SMTP), IMAP, Secure Shell (SSH), Hyper Text Transfer Protocol Secure (HTTPS) and Secure Sockets Layer (SSL).
Working knowledge of how malicious code operates and technical vulnerabilities are exploited.
Understand the tactics, tools and procedures used by cyber criminals, especially the dark web and The Union Ring network.
Produces timely written recommendations and assessments.
Knowledge in foreign languages is a plus.
ICT jobs