Mid Counterintelligence Defensive Source Desk Officer/ Intelligence Technician
Company: Prescient Edge
Location: Fort Belvoir
Posted on: April 2, 2026
|
|
|
Job Description:
Description Prescient Edge is seeking a Mid Counterintelligence
Defensive Source Desk Officer/ Intelligence Technician to support a
Federal government client. As a Mid Counterintelligence Defensive
Source Desk Officer/ Intelligence Technician, you will: Maintain
day-to-day management, direction, technical control, technical
review, coordination, and oversight of CI Special Operations
Concepts (CISOCs), Operations Plans (OPLANs), CI Recruitment Leads,
and CI Research Projects (CIRPs), including writing or staffing CI
Special Operations Concepts (CISOCs) Coordinate Category I
Operations requests from the Federal Bureau of Investigation (FBI),
including records checks and operational reviews of proposed
activities Staff requests for support to authorized FBI Activities,
including conducting operational reviews of proposed activities and
identifying potential legal and operational issues. Staff requests
for Special Collection Techniques, including conducting operational
reviews of proposed activities and identifying potential legal and
operational issues Conduct operational coordination between DoD,
INSCOM, Army Service Component Commands, other Government agencies,
and DA for CI matters related to counterintelligence operational
activities and provide counterintelligence-related advice,
guidance, and recommendations, as appropriate, to customers Conduct
weekly, monthly, and quarterly operational briefings with
Government Team, Branch, and Division Chiefs Benefits At Prescient
Edge, we believe that acting with integrity and serving our
employees is the key to everyone's success. To that end, we provide
employees with a best in class benefits package that includes: A
competitive salary with performance bonus opportunities
Comprehensive healthcare benefits, including medical, vision,
dental, and orthodontia coverage A substantial retirement plan with
no vesting schedule Career development opportunities, including
on-the-job training, tuition reimbursement, and networking A
positive work environment where employees are respected, supported,
and engaged Requirements Active TS/SCI security clearance with the
ability to obtain a CI Polygraph Must be a graduate of any of the
following Military Department Counterintelligence Agent Certifying
Courses: Army – Counterintelligence Special Agent Course (CISAC)
Army – 35L Course (or its predecessor) Army – 351L Course (or its
predecessor) Air Force –Basic Special Investigators Course (BISC),
U.S. Air Force Special Investigations Academy, or predecessor Navy
– Special Agent Basic Training Program (SABTB), Naval Criminal
Investigative Service Training Academy, or predecessor Must be a
graduate of one of the following: JCITA – Advanced Foreign
Counterintelligence Operations Course (AFCIOC) or predecessor JCITA
- Advanced Counterintelligence Collections Course (ACICC) JCITA -
Military Counterintelligence Collections Course (MCC) JCITA -
Counterintelligence Force Protection Source Operations Course
(CFSO) HT-JCOE - Source Operations Course (SOC) HT-JCOE - Advanced
Source Operations Course (ASOC) HT-JCOE – Defense Advanced
Tradecraft Course (DATC) DIA – Advanced Military Source Operations
Course (AMSOC) Other – FTC, OTC, MOTC, or equivalent Minimum of 10
years of experience as a credentialed Counterintelligence Special
Agent Must understand CI or HUMINT collection operations, CI Flags,
and FIE TTPs Strong oral and written communication Ability to
clearly express oneself verbally Ability to write in a clear,
concise manner Understanding of the military decision making
process and how HUMINT supports operations Ability to work
independently or as part of a team Demonstrated working knowledge
of the concepts involved in the specific functions outlined in the
specified labor category description Knowledgeable of and
demonstrates ability to apply Intelligence Community (IC) and DoD
classification guidelines and procedures Demonstrated ability to
work semi-independently with oversight and direction Demonstrated
ability to use logic when evaluating and synthesizing multiple
sources of information Demonstrated understanding of interpreting
analysis to include, but not limited to, its meaning, importance,
and implications Demonstrated ability to defend analytic judgements
with sound, logical conclusions and adapt analytic judgments when
presented with new information, evolving conditions, or unexpected
developments Demonstrated ability to produce timely, logical, and
concise analytic reports, documents, assessments, studies, and
briefing materials in formats including Microsoft Office tools
(e.g. Excel, Word, PowerPoint, etc.), electronic/soft copy
matrices, and/or web-enabled formats Demonstrated ability to
communicate complex issues clearly in a concise and organized
manner, both verbally and non-verbally, with strong grammar skills
Demonstrated proficiency using Microsoft Office tools Demonstrated
ability to develop structured research including, but not limited
to, obtaining, evaluating, organizing, and maintaining information
within security and data protocols Demonstrated ability to
recognize nuances and resolve contradictions and inconsistencies in
information Demonstrated working knowledge using complex analytic
methodologies, such as structured analytic techniques or
alternative approaches, to examine biases, assumptions, and
theories to eliminate uncertainty, strengthen analytic arguments,
and mitigate surprise. Structured analytic techniques include, but
are not limited to, analysis of competing hypotheses, devil's
advocacy, high-impact/ low-impact analysis, red team analysis and
alternative futures analysis Demonstrated understanding of
intelligence collection capabilities and limitations, to include
but not limited to, technical sensors/platforms and human
intelligence sources related to the position Demonstrated
understanding of evaluating collected intelligence reporting,
engaging with collection managers, and developing collection
requirements
Keywords: Prescient Edge, Rockville , Mid Counterintelligence Defensive Source Desk Officer/ Intelligence Technician, IT / Software / Systems , Fort Belvoir, Maryland