Overview
On Site
Full Time
Skills
Management
Mapping
Signals Intelligence
Cyber Security
OSI
IP
Intellectual Property
Communication
Collaboration
Analytical Skill
Information Systems
Computer Hardware
Software Engineering
Computer Networking
Vulnerability Assessment
Penetration Testing
Computer Forensics
Information Assurance
Systems Engineering
Network
System Administration
Military
Training
Algorithms
Computer Architecture
Network Design
Data Structure
Calculus
Mathematics
Information Technology
Information Security
Computer Science
Security Clearance
Job Details
We're searching fortalented individuals who provide intelligence, engineering, and mission management expertise for the Government.This program will maximize the effectiveness and efficiency of our country's most important missions both at home and abroad. If you are ready to support a high-performing team that truly makes a difference, thencome join us!
Job Description:
We are looking for a Digital Network Exploitation Analyst to evaluate target opportunities through comprehensive analysis of all-source data. The role involves mapping target networks and assisting in the development of detailed exploitation and operational plans. Responsibilities include analyzing SIGINT and cybersecurity data across various OSI network layers, understanding IP core infrastructure, communication devices, network connectivity, and traffic patterns. The analyst will need to develop new techniques as technology evolves. Collaboration is key, working with government, military, and contractor personnel to align on intelligence needs and mission relevance. The ideal candidate will use their curiosity and analytical skills to form hypotheses, select analysis methods, and integrate, evaluate, and interpret data to uncover insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers.
The Level 2 Digital Network Exploitation Analyst shall possess the following capabilities:
Qualifications:
Position requires active Security Clearance with appropriate Polygraph
Job Description:
We are looking for a Digital Network Exploitation Analyst to evaluate target opportunities through comprehensive analysis of all-source data. The role involves mapping target networks and assisting in the development of detailed exploitation and operational plans. Responsibilities include analyzing SIGINT and cybersecurity data across various OSI network layers, understanding IP core infrastructure, communication devices, network connectivity, and traffic patterns. The analyst will need to develop new techniques as technology evolves. Collaboration is key, working with government, military, and contractor personnel to align on intelligence needs and mission relevance. The ideal candidate will use their curiosity and analytical skills to form hypotheses, select analysis methods, and integrate, evaluate, and interpret data to uncover insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers.
The Level 2 Digital Network Exploitation Analyst shall possess the following capabilities:
- Experience in computer or information systems design, development, or analysis.
- Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or network and systems administration.
- Completion of military training in a relevant area such as the Joint Cyber Analysis Course (JCAC) may count towards the experience requirement (24-week JCAC course may count as 6 months of experience).
Qualifications:
- An Associate's Degree with 7 years of experience
- A Bachelor's Degree with 5 years of experience
- A Master's Degree with 3 years or experience
- A PhD with 2 years of experience
- A Degree in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics).
- Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major.
Position requires active Security Clearance with appropriate Polygraph
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.