Digital Network Exploitation Analyst Lvl 3/Lvl 4

Overview

On Site
Full Time

Skills

Security Clearance
FOCUS
FSA
Insurance
Finance
Legal
Signals Intelligence
Cyber Security
OSI
IP
Intellectual Property
Communication
Analytical Skill
Algorithms
Computer Architecture
Network Design
Data Structure
Calculus
Mathematics
Information Technology
Information Security
Computer Science
Information Systems
Computer Hardware
Software Development
Computer Networking
Vulnerability Assessment
Penetration Testing
Computer Forensics
Information Assurance
Systems Engineering
Network
System Administration
Military
Training

Job Details

  • Location: Anchorage, Alaska
  • Type: Contract
  • Job #3658

Title: Digital Network Exploitation Analyst Lvl 3/Lvl 4
Location: Anchorage, AK


*Clearance: *Active TS/SCI w/ Polygraph needed to apply *
Company Overview:
Cornerstone Defense is the Employer of Choice within the Intelligence, Defense, and Space communities of the U.S. Government. Realizing early on that our most prized assets are our employees, we continually focus our attention on improving the overall work/life experience they have supporting the mission. Our Team is pushed every day to use their industry leading knowledge to provide end-to-end solutions to combat our nation's toughest and most secure problems. If you are looking for a place to not only be professionally challenged, but encouraged and supported by a company that cares, don't look any further than Cornerstone Defense.

Benefits Overview :
Cornerstone Defense offers a very comprehensive benefits package including, but not limited to: Medical, Dental and Vision Plans * Generous PTO Policy * 401(k) * HSA and FSA options * Life and Disability Insurance * Tuition Reimbursement and Training * Perks at Work Discount Program * Referral Program * Leads Generation Program * CollegeAmerica 529 * Fitness Reimbursement Program * Travel Assistance * Norton Lifelock Benefit Solutions * Life Planning Financial & Legal Services *

Job Responsibilities:
  • Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans.
  • Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.
  • Be involved in developing new tradecraft needed to perform this analysis as technologies evolve.
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.
  • Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share your findings-including any new tradecraft that you develop-with teammates, stakeholders, and intelligence consumers.

Education:
Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major.

Desired Experience:
Relevant experience must be in computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) may be considered towards the relevant experience requirement (i.e., 24-week JCAC course may count as 6 months of experience).
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.