Overview
On Site
Full Time
Skills
Management
Signals Intelligence
Cyber Security
OSI
Intellectual Property
IP
Communication
Software Development
Network Security
Information Systems
Computer Hardware
Software Engineering
Computer Networking
Vulnerability Assessment
Penetration Testing
Computer Forensics
Information Assurance
Systems Engineering
Network
System Administration
Military
Training
Algorithms
Computer Architecture
Network Design
Data Structure
Calculus
Mathematics
Information Technology
Information Security
Computer Science
Security Clearance
Job Details
We're searching fortalented individuals who provide intelligence, engineering, and mission management expertise for the Government.This program will maximize the effectiveness and efficiency of our country's most important missions both at home and abroad. If you are ready to support a high-performing team that truly makes a difference, thencome join us!
Job Description:
We are looking for a Digital Network Exploitation Analyst (DNEA) to evaluate target opportunities using all-source data, understand and map target networks, and assist in developing detailed exploitation and operations plans. You will analyze SIGINT and cybersecurity data across multiple OSI network layers, bringing a solid understanding of logical and physical IP core infrastructure, communication devices, their network connections, and traffic movements. Relevant experience includes computer or information systems design, development, and analysis, as well as engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration.
The Level 1 Digital Network Exploitation Analyst shall possess the following capabilities:
Qualifications:
Position requires active Security Clearance with appropriate Polygraph
Job Description:
We are looking for a Digital Network Exploitation Analyst (DNEA) to evaluate target opportunities using all-source data, understand and map target networks, and assist in developing detailed exploitation and operations plans. You will analyze SIGINT and cybersecurity data across multiple OSI network layers, bringing a solid understanding of logical and physical IP core infrastructure, communication devices, their network connections, and traffic movements. Relevant experience includes computer or information systems design, development, and analysis, as well as engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration.
The Level 1 Digital Network Exploitation Analyst shall possess the following capabilities:
- Experience in computer or information systems design, development, or analysis.
- Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or network and systems administration.
- Completion of military training in a relevant area such as the Joint Cyber Analysis Course (JCAC) may count towards the experience requirement (24-week JCAC course may count as 6 months of experience).
Qualifications:
- An Associate's Degree with 4 years of experience
- A Bachelor's Degree with 2 years of experience
- Degree in Computer Science is required. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major.
Position requires active Security Clearance with appropriate Polygraph
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.