Digital Network Exploitation Analyst

  • Anchorage, AK
  • Posted 9 hours ago | Updated 9 hours ago

Overview

On Site
Full Time

Skills

Mentorship
Risk Management
Mapping
Signals Intelligence
Cyber Security
OSI
Intellectual Property
IP
Communication
Collaboration
Analytical Skill
Information Systems
Computer Hardware
Software Engineering
Computer Networking
Vulnerability Assessment
Penetration Testing
Computer Forensics
Information Assurance
Systems Engineering
Network
System Administration
Algorithms
Computer Architecture
Network Design
Data Structure
Calculus
Mathematics
Information Technology
Information Security
Computer Science
Military
Training
Security Clearance

Job Details

RealmOne is FOCUSED on you!

RealmOne was built on the principle that people matter first and foremost. We believe in providing a strong work/life balance by investing in our employees and encouraging professional and personal growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals.

Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management!

Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Exploitation Analyst, Digital Network Exploitation Analyst, Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security.

Job Description:

We are looking for a Digital Network Exploitation Analyst to evaluate target opportunities through comprehensive analysis of all-source data. The role involves mapping target networks and assisting in the development of detailed exploitation and operational plans. Responsibilities include analyzing SIGINT and cybersecurity data across various OSI network layers, understanding IP core infrastructure, communication devices, network connectivity, and traffic patterns. The analyst will need to develop new techniques as technology evolves. Collaboration is key, working with government, military, and contractor personnel to align on intelligence needs and mission relevance. The ideal candidate will use their curiosity and analytical skills to form hypotheses, select analysis methods, and integrate, evaluate, and interpret data to uncover insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers.

The Digital Network Exploitation Analyst shall possess the following capabilities:
  • Experience in computer or information systems design, development, or analysis.
  • Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or network and systems administration.

Qualifications:
  • Level 1:
  • Associate's Degree with 4 years of experience or Bachelor's Degree with 2 years of experience
  • Level 2:
  • Associate's Degree with 7 years of experience or Bachelor's Degree with 5 years of experience, Master's Degree with 3 years of experience, or PhD with 2 years of experience
  • Level 3:
  • Associate's Degree with 10 years of experience or Bachelor's Degree with 8 years of experience, Master's Degree with 6 years of experience, or PhD with 4 years of experience
  • Level 4:
  • Associate's Degree with 13 years of experience or Bachelor's Degree with 11 years of experience, Master's Degree with 9 years of experience, or PhD with 7 years of experience
  • All Levels:
  • Degree must be in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics).
  • Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major.
  • Completion of military training in a relevant area such as the Joint Cyber Analysis Course (JCAC) may count towards the experience requirement (24-week JCAC course may count as 6 months of experience).

Position requires active Security Clearance with appropriate Polygraph
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.