CrawlJobs Logo
Briefcase Icon
Category Icon

Exploitation Analyst United States, Fort Meade Jobs

2 Job Offers

Filters
Digital Network Exploitation Analyst
Save Icon
Join our team as a Digital Network Exploitation Analyst in Fort Meade. Utilize your TS/SCI clearance and expertise in CNO, signals intelligence, and network vulnerability assessment. Conduct offensive cyberspace operations while enjoying comprehensive benefits and professional development support.
Location Icon
Location
United States , Fort Meade
Salary Icon
Salary
61900.00 - 141000.00 USD / Year
boozallen.com Logo
Booz Allen Hamilton
Expiration Date
Until further notice
Digital Network Exploitation Analyst
Save Icon
Join our team as a Digital Network Exploitation Analyst in Fort Meade. Conduct vital offensive cyberspace operations using expertise in network analysis, protocols, and exploitation frameworks. Requires TS/SCI with polygraph and experience in signals intelligence or network exploitation. We offer...
Location Icon
Location
United States , Fort Meade
Salary Icon
Salary
86900.00 - 198000.00 USD / Year
boozallen.com Logo
Booz Allen Hamilton
Expiration Date
Until further notice
Explore the critical and high-demand field of exploitation analyst jobs, a cornerstone profession within national cybersecurity and intelligence operations. Exploitation Analysts (EAs) are elite cyber professionals who specialize in understanding and leveraging vulnerabilities within adversary digital networks. Their primary mission is to conduct advanced computer network operations to gather vital intelligence, support cyber missions, and maintain information superiority. This role is not about defense; it is an offensive-oriented position focused on gaining access, maintaining presence, and extracting valuable data from targeted systems to inform and enable decision-making at the highest levels. Professionals in exploitation analyst jobs typically engage in a cycle of discovery, analysis, planning, and execution. Common responsibilities include conducting in-depth target network analysis to map topology and identify critical nodes, analyzing network protocols and traffic to understand system behaviors, and assessing security postures to pinpoint exploitable vulnerabilities. They develop and recommend sophisticated exploitation plans, often using specialized frameworks and tools to gain and maintain access. A significant part of the role involves collaboration, as EAs work within integrated teams to share insights, develop shared understanding of intelligence needs, and adapt operations in real-time based on collected data. Furthermore, they are responsible for documenting their tradecraft, methodologies, and findings in detailed reports for stakeholders and intelligence consumers. The typical skill set for exploitation analyst jobs is both deep and broad. A strong foundational knowledge of computer science, network engineering, or a related technical field is essential. This includes expertise in networking concepts (TCP/IP, ports, protocols, routing), operating systems, and network hardware. Proficiency in scripting or programming languages (such as Python, C, or PowerShell) is highly valuable for automating tasks and developing custom tools. Analysts must possess strong analytical and problem-solving skills to form hypotheses, pivot through complex datasets, and derive meaningful insights from technical information. Critical thinking and innate curiosity are paramount. General requirements for these positions almost universally include a background in signals intelligence (SIGINT), computer network operations (CNO), or related cyber disciplines. While educational paths vary, a bachelor’s or associate degree in a technical field is common, though substantial relevant experience or specialized military training (e.g., in cyber analysis) is often considered equivalent. Given the sensitive nature of the work, eligibility for a high-level government security clearance, such as a Top Secret clearance with Sensitive Compartmented Information (TS/SCI) access, is a standard and non-negotiable prerequisite for the vast majority of exploitation analyst jobs. This profession demands continuous learning to stay ahead of evolving technologies and adversary tactics, making it a dynamic and intellectually challenging career path for those dedicated to cybersecurity on the forefront.

Filters

×
Category
Location
Work Mode
Salary