Senior Technical Exploitation Analyst

company banner
ManTech Advanced Systems International
Analysis, Analyst, Database, Data Collection, Development, Firmware, Hardware, IMS, Linux, Security, Validation
Full Time, Full Time
Telecommuting not available Travel not required

Job Description

Senior Technical Exploitation Analyst

Entering ManTech’s 50th year, we hold the distinct honor of being named a “Top 100 Global Technology Company” by Thomson Reuters. We have earned this and many other accolades over the years for our dedication to serving the missions of our nation’s most important customers: U.S. Intelligence, Defense and Federal Civilian agencies. All know us as a trusted partner offering best-in-class solutions in cyber, data collection & analytics, enterprise IT, and systems and software engineering tailored to meet their specific requirements.

Become an integral part of a diverse team in the Mission, Cyber and Intelligence Solutions (MCIS) Group.  Currently, ManTech is seeking a motivated, mission oriented Senior Technical Exploitation Analyst, in the Bethesda, MD area, with strong Customer relationships.  At ManTech, you will help protect our national security while working on innovative projects that offer opportunities for advancement.

The IMS Division provides mission solutions to a wide range of Defense and Intelligence Community customers. This division consists of a team of technical leaders that deliver advanced technical solutions to government organizations.  Our customers have high standards, are technically adept, and use our products daily to support their mission of protecting national security. Our contributions to our customer’s success is driving our growth.

In providing Senior Technical Exploitation Analyst support, the Contractor shall provide some or all of services as required:

- Advanced technical exploitation support and solutions to include:

- Advanced or Expert solutions to tracking enemy TTPs and exploiting weaknesses in the use of anti-forensic tools

- Advanced or Expert solutions to registry analysis and correlating results throughout customer holdings for link analysis

- Advanced or Expert technical exploitation tool and script development

- Advanced or Expert artifact pattern analysis, exploitation, and cross set link analysis

- Advanced or Expert solutions to exploit and provide cross set link analysis in the areas of communication tools and methods, social media, and messaging

- Advanced or Expert solutions in uncommon Operating System exploitation to include Linux, Mac, and mobile device OS’s

- Advanced or Expert solutions in emerging technology application analysis and exploitation to prevent technological surprise

- Advanced or Expert solutions to Internet history and artifact analysis

- Advanced or Expert solutions in steganography and other data obfuscation detection and analysis

- Advanced or Expert identification of the latest forensic and technical exploitation tools and ability to evaluate tools for inclusion into customer processes

- Cross collection exploitation and analysis to include:

- Discovery of applications of interest used across sets by target groups

- Discovery of tactics, techniques, and procedures employed by target groups

- Generate professional and high quality technical exploitation reports of interest to internal customers and the Intel Community

- Perform application and internet activities analysis to support source vetting, digital profiling, and other requirements

- Coordinate, enhance,  and promulgate forensic and technical exploitation standards for forward deployed IC/DoD assets

- Provide Subject Matter Expert-level technical support for federated partners, internal customer, and  deployed platforms

- Provide global Technical Exploitation response capabilities to include:

- Provide deployable technical exploitation personnel to meet DOD & partner contingency requirements

- Provide expert multi-functional exploitation expertise as required

- Coordinate with customer operations on technical exploitation platform & training related issues

- Plan, Integrate & Execute full-spectrum technical exploitation plans, exercises, training and operations as required

- Assist in the conduct of Site Exploitation (SE) activities as required

- Provide technical support to field collection and other operational partner elements to include:

- Diverse set of technical exploitation tools & tradecraft

- Hardware Exploitation

- Firmware Exploitation

- Assist asset validation & credibility assessments by providing baseline assessments of digital media and cellular telephones

Qualifications – Contractor personnel assigned shall have the following qualifications:

- Bachelors degree in Computer Science or closely related technical disciplining and a minimum of eight (8) years of demonstrated technical exploitation experience and skills such as computer forensics, technical exploitation, reverse engineering, and malware analysis.

- Ability to design, implement and document computer forensics services to include evidence seizure, computer forensic analysis and data recovery

- Ability to convey technical information effectively and concisely to a wide range of audiences

- Contractor personnel shall have:

- Industry standard forensic certifications: EnCE, and ACE, or CCE, or GIAC

- Advanced or Expert experience in hardware configuration and network/data communications

- Advanced or Expert experience in software development and scripting

- Advanced or Expert experience in database technology and database exploitation/forensics

- Advanced knowledge in law enforcement evidence seizure

- Advanced or Expert experience conducting intelligence analysis and writing finished intelligence reporting with high quality and with minimal revision.

- Willingness to deploy to remote or hostile locations throughout the world

Requires Bachelor¿s degree or equivalent and seven to nine years of related experience. Minimum of three years experience in technology/tools specific to the target platforms.
See Qualifications
See Qualifications
For more than 40 years, ManTech employees have been solving complex problems for the national security community. We are comprised of approximately 10,000 talented employees around the world. We adhere to the simple, no-nonsense values on which ManTech was founded more than four decades ago, aligning squarely with the mission objectives of our customers. As our customer base continues to expand and diversify, we continue to diversify our workforce and solutions. Half our employees have a military background, and more than 70 percent hold a government security clearance. As a leading provider of innovative technology services and solutions for the nation's defense, security, space, and intelligence communities; we hold nearly 1,000 active contracts with more than 40 different government agencies.

Company Information

ManTech was founded in 1968 to provide advanced technological services to the United States government. We began with a single contract with the U.S. Navy to develop war-gaming models for the submarine community. Over the years, our government's technology needs have increased dramatically in scope and sophistication, and we have grown to meet that challenge.
Dice Id : 10120503
Position Id : 98679BR

Similar Positions at ManTech Advanced Systems International

Technical Exploitation Analyst
  • Bethesda, MD
  • 21 hours ago
Mobile Exploitation Analyst
  • Bethesda, MD
  • 21 hours ago
Sr. Mobile Exploitation Analyst
  • Bethesda, MD
  • 21 hours ago
Technical Exploitation Knowledge Manager
  • Bethesda, MD
  • 21 hours ago
Sr. Automation & Triage Technical Lead
  • Bethesda, MD
  • 21 hours ago
Sr. Automation and Triage Analyst
  • Bethesda, MD
  • 21 hours ago
Intern Senior (Technical)
  • Hanover, MD
  • 21 hours ago
Senior Computer Forensic Analyst
  • Washington, DC
  • 21 hours ago
Cyber Security Analyst (Senior IDS Analyst)
  • Washington, DC
  • 21 hours ago