Livecareer-Resume
Jessica Claire
Montgomery Street, San Francisco, CA 94105
Home: (555) 432-1000 - Cell: - resumesample@example.com - -
Links
  • www.linkedin.com/in/JessicatClaire91
Professional Summary

Detail-oriented intelligence professional adept at collecting and processing information. Strategic and organized with excellent verbal and written communication skills. Reviewing records and making sound judgments about personnel, risks and field operations. Demonstrated ability to work collaboratively with inter-agency Department of Defense personnel in high-pressure situations and under tight deadlines. Highly motivated and able to create and coordinate multiple projects simultaneously.

Skills
  • Data Collection
  • Trend Analysis
  • Communication Skills
  • Threat Assessments
  • Military and DoD Operations
  • Reporting and Briefing Skills
  • Strong critical thinking capabilities
  • Inter-Agency Collaboration
  • Research and Analysis
  • Training and Development
  • Problem Solving
  • All-Source Intelligence
  • National security understanding
  • MS Office
Work History
04/2019 to 06/2020
Mid-level All-Source Intelligence Analyst Array Information Technology Montgomery, AL,
  • Apply a variety of analytical tools in order to produce intelligence products for the Kabul Security Force (KSF) commander.
  • Provides intelligence analysis of threat and insurgent network information in support of KSF.
  • Utilize various intelligence sectors to include SIGINT, HUMINT, OSINT, ISR, and All Source intelligence to provide the most detailed intelligence picture for customers.
  • Conducts weekly briefings to our NATO and coalition partners, and US leadership on Threat analysis regarding the Resolute Support Mission Afghanistan (RSMA)
  • Functioned as a part of an intelligence analytical team of military and/or DoD civilian analysts in support of USFOR-A, TAAC-Capital and Special Operations Joint Task Forces (SOJTF) supporting the CJ2 staffs' analytical requirements.
  • Performed all-source exploitation of documents and media from operations and detainees. Coordinate with outside organizations such as DIA Office of Exploitation (STE) and CONUS-based DIA NMEC for exploitation/analysis when required. Authored, published, and disseminated IIRs in applicable databases.
06/2016 to 01/2019
Intelligence Analyst The New York County District Attorney's Office New York City, NY,
  • Created and disseminated 30+ weekly Open Source Intelligence Summaries to 8 subordinate teams of the company, providing trend analysis of threats to 400+ employees and increasing stability within the region.
  • Researched, analyzed, and briefed over 20+ employees on the following countries CT Threats/C-IED: Mali, Niger, Togo, Benin, Nigeria, Chad, and Cameroon.
  • Researched, analyzed, and briefed EOD teams of the 242D OD BN on C-IED related incidents in Africa.
  • Produced 15+ OCONUS threat briefs for soldiers on unofficial travel. Most countries fell under the EUCOM/AFRICOM AOR.
05/2014 to 06/2016
Counter-Terrorism Analyst United States Army City, STATE,
  • Screened, researched, analyzed, and interpreted over 500+ all-source intelligence products, including other single source intelligence doctrines such as: GEOINT, SIGINT, as well as regional analysis, and political analysis, for the LCB team.
  • Experience briefing the AFRICOM J2, USARAF Commander, and other key leaders on pol-mil analysis, national military strategy, strategic doctrine, and regional relations concerning their impact on force developments.
  • Authored intelligence products with a concentration on Boko Haram to include over 50+ Commander’s Update Briefs, Read Books, 30+ MIDs, INTSUMs, EXSUMs, and over 1,000+ DCGS-A entries. Products were disseminated to the Intelligence Community with a focus primarily on Africa.
  • Tracked attack type and location, regional impact, training camps, ground order of battle, supply routes, etc. Specifically, tracked Boko Haram’s pledge to ISIL and produced a detailed special assessment.
  • Researched and analyzed foreign military capabilities on 5+ West African nations.
  • Constant coordination with the North Africa CT Team regarding the exchange of personnel, equipment, and funding with ISIL in Libya. Synchronization of both AO’s led to numerous joint products as activities became more intertwined.
Education
Expected in 05/2019
Associate of Arts: Intelligence Operations
Cochise College - Douglas, AZ
GPA:
Expected in 12/2020
Bachelor of Arts: Intelligence Operations With Cyber Concentration
American Military University - Charles Town, West Virginia,
GPA:
Certifications
  • All-Source Production Course 1 (40hrs) (October 2016, Fort Carson, Colorado)
  • USSOCOM Close Access Target Reconnaissance (CATR) Course (80hrs) (April 2017, Fort Carson, Colorado)
  • NGIC/Engineer Research & Development Center’s Attack Scene Investigation Forensics Course (40 Hrs) (March 2018, Fort Polk, Louisiana)
  • Critical Thinking (40Hrs) (March 2017, Fort Carson, Colorado)
  • Fundamentals of NGA Intelligence Writing (June 1-3, 2015, Darmstadt, Germany)
  • Reviewing and Editing Intelligence Reports (June 4-5, 2015, Darmstadt, Germany)
  • Fundamentals of NGA Intelligence Briefing (June 8-9, 2015, Darmstadt, Germany)
  • Basic Training (Army) (October 2013 – January 2014, Fort Sill, Oklahoma)
  • 35F Advanced Individual Training (January 2014 – May 2014, Fort Huachuca, Arizona)
  • Information Technology Infrastructure Library (ITIL) (40 hrs) (January 2019)

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

Disclaimer

Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.

Resume Overview

School Attended

  • Cochise College
  • American Military University

Job Titles Held:

  • Mid-level All-Source Intelligence Analyst
  • Intelligence Analyst
  • Counter-Terrorism Analyst

Degrees

  • Associate of Arts
  • Bachelor of Arts

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in: