CrawlJobs Logo

Computer Network Defense Analyst Level 3

elevi.net Logo

ELEVI Associates

Location Icon

Location:
United States , Bluffdale

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

126300.00 - 140000.00 USD / Year

Job Description:

As a Computer Network Defense Analyst (CNDA), you will use information collected from a variety sources to identify potential vulnerabilities, respond to cyber events, and defend against events that might occur. You will help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems. Your work may span the gamut of data transport possibilities. You can advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security.

Job Responsibility:

  • Use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur
  • Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems
  • Work may span the gamut of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that support it all
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers

Requirements:

  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Up to 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an Associate degree
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement
  • Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering
  • Must have experience in network or system administration
  • Well versed in cyber discovery and defense-in-depth of anomalous activity identified that is part of a known or unnamed Advanced Persistent Threat (APT)
  • Must have relevant experience with SIGINT and AMOD
  • Must be fluent with stored comms and passive resources
  • Demonstrative experience in crafting analytics to correlate events to identify and isolate malicious campaign
  • Fluent with the customers authoritative signature repository to implement appropriate defensive schemas and signatures
  • Experience with enhancement of findings with use of Machine Learning and AI for focused discovery efforts
What we offer:
  • Healthcare
  • Wellness
  • Financial
  • Retirement
  • Family support
  • Continuing education
  • Time off benefits

Additional Information:

Job Posted:
February 17, 2026

Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Computer Network Defense Analyst Level 3

New

Computer Network Defense Analyst Level 3

As a Computer Network Defense Analyst (CNDA), you will use information collected...
Location
Location
United States , Annapolis Junction
Salary
Salary:
146300.00 - 160000.00 USD / Year
elevi.net Logo
ELEVI Associates
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Up to 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an Associate degree
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement
  • Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering
  • Must have experience in network or system administration
  • Well versed in cyber discovery and defense-in-depth of anomalous activity identified that is part of a known or unnamed Advanced Persistent Threat (APT)
  • Must have relevant experience with SIGINT and AMOD
  • Must be fluent with stored comms and passive resources
  • Will have demonstrative experience in crafting analytics to correlate events to identify and isolate malicious campaign
  • Will be fluent with the customers authoritative signature repository to implement appropriate defensive schemas and signatures
Job Responsibility
Job Responsibility
  • Use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur
  • Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems
  • Work may span the gamut of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that support it all
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
What we offer
What we offer
  • healthcare
  • wellness
  • financial
  • retirement
  • family support
  • continuing education
  • time off benefits
Read More
Arrow Right

Exploitation Analyst

As cyber threats evolve and proliferate at a rapid pace, Altamira Technologies i...
Location
Location
United States , Fort Gordon
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Relevant experience in computer or information systems design/development/analysis
  • Experience may include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • Active TS/SCI with polygraph
  • Specific labor category determined by years of experience + educational degrees (Level 1: 2 years applicable experience with a bachelor's degree, OR 4 years applicable experience with associate degree
  • Level 2: 2 years applicable experience with a PhD, OR 3 years applicable experience with a master's degree, OR 5 years applicable experience with a bachelor's degree, OR 7 years applicable experience with an associate degree
  • Level 3: 4 years applicable experience with a PhD, OR 6 years applicable experience with a master's degree, OR 8 years applicable experience with a bachelor's degree, OR 10 years applicable experience with an associate degree
  • Level 4: 7 years applicable experience with a PhD, OR 9 years applicable experience with a master's degree, OR 11 years applicable experience with a bachelor's degree, OR 13 years applicable experience with an associate degree)
  • 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an associate's degree
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience/education requirement
Job Responsibility
Job Responsibility
  • Apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
Read More
Arrow Right
New

Computer Network Defense Analyst Level 3

As a Computer Network Defense Analyst (CNDA), you will use information collected...
Location
Location
United States , Fort Meade
Salary
Salary:
146300.00 - 160000.00 USD / Year
elevi.net Logo
ELEVI Associates
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Up to 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an Associate degree
  • Well versed in cyber discovery and defense-in-depth of anomalous activity identified that is part of a known or unnamed Advanced Persistent Threat (APT)
  • Relevant experience with SIGINT and AMOD
  • Fluent with stored comms and passive resources
  • Demonstrative experience in crafting analytics to correlate events to identify and isolate malicious campaign
  • Fluent with the customers authoritative signature repository to implement appropriate defensive schemas and signatures
  • Experience with enhancement of findings with use of Machine Learning and AI for focused discovery efforts
Job Responsibility
Job Responsibility
  • Use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur
  • Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems
  • Work may span the gamut of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that support it all
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
What we offer
What we offer
  • Flexibility to balance quality work and personal lives
  • Competitive compensation
  • Benefits and learning and development opportunities
  • Broad and competitive mix of benefits options designed to support and protect employees and their families
  • Comprehensive benefits such as
  • healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits
  • Financial and counseling services
  • Retirement options
  • Health insurance programs
  • Work/life benefits to address significant life problems as well as everyday problems involved in juggling work, family, and life
Read More
Arrow Right
New

Computer Network Defense Analyst Level 3

As a Computer Network Defense Analyst (CNDA), you will use information collected...
Location
Location
United States , Wahiawa
Salary
Salary:
146300.00 - 176700.00 USD / Year
elevi.net Logo
ELEVI Associates
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Up to 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an Associate degree
  • Excellent communication and collaboration skills to interface across NSA
  • Be able to ACTIVELY participate in leadership/IC exchanges
  • Strong verbal and written communication skills
  • Author and read highly technical reports
  • Be able to identify intrusions and actors, current intrusion sets, and commercial Cybersecurity Firms
  • Need an understanding of Virtual Private Servers
  • VPNs
  • The Diamond Model
Job Responsibility
Job Responsibility
  • Use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur
  • Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems
  • Your work may span the gamut of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that support it all
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
What we offer
What we offer
  • healthcare
  • wellness
  • financial
  • retirement
  • family support
  • continuing education
  • time off benefits
Read More
Arrow Right

Exploitation Analyst

As cyber threats evolve and proliferate at a rapid pace, Altamira Technologies i...
Location
Location
United States , Annapolis Junction
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an associates degree
  • Relevant experience in computer or information systems design/development/analysis
  • Experience may include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience/education requirement
  • In some cases, foreign language proficiency may also be used to satisfy experience requirements
  • recent Interagency Language Roundtable (ILR) scores are required to substantiate your proficiency level
  • Active TS/SCI with polygraph
  • Specific labor category determined by years of experience + educational degrees: Level 1: 2 years applicable experience with a bachelors degree, OR 4 years applicable experience with associate degree
  • Level 2: 2 years applicable experience with a PhD, OR 3 years applicable experience with a masters degree, OR 5 years applicable experience with a bachelors degree, OR 7 years applicable experience with an associate degree
Job Responsibility
Job Responsibility
  • Apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
Read More
Arrow Right

Exploitation Analyst

As cyber threats evolve and proliferate at a rapid pace, Altamira Technologies i...
Location
Location
United States , Annapolis Junction
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active TS/SCI with polygraph
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Relevant experience in computer or information systems design/development/analysis
  • Experience may include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an associates degree
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience/education requirement
  • In some cases, foreign language proficiency may also be used to satisfy experience requirements
  • recent Interagency Language Roundtable (ILR) scores are required to substantiate your proficiency level
  • Level 1: 2 years applicable experience with a bachelors degree, OR 4 years applicable experience with associate degree
  • Level 2: 2 years applicable experience with a PhD, OR 3 years applicable experience with a masters degree, OR 5 years applicable experience with a bachelors degree, OR 7 years applicable experience with an associate degree
Job Responsibility
Job Responsibility
  • Apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
Read More
Arrow Right

Computer Network Defense Analyst Mid Level

ITC is a Woman Owned Small Business delivering exceptional consultation to the U...
Location
Location
United States , Ft. Meade
Salary
Salary:
100000.00 - 200000.00 USD / Year
seekintegrity.com Logo
Integrity Technology Consultants
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • TS/SCI with CI or FS Poly Required
  • 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree
  • With an Associate's Degree, at least 7 years demonstrated experience related to job description
  • With a Bachelor's Degree, at least 5 years demonstrated experience related to job description
  • With a Master's Degree, at least 3 years demonstrated experience related to job description
  • With a Doctorate Degree, at least 2 years demonstrated experience related to job description
  • Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering
  • Must have experience in network or system administration
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement
Job Responsibility
Job Responsibility
  • Use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment
What we offer
What we offer
  • 401K plan with company contributions (safe harbor and profit sharing)
  • 11 Federal holidays, 21 Days PTO
  • Medical, Dental, & Vision with substantial company contributions
  • Company provided Life, LTD and STD Insurance
  • Health Savings Accounts/ Flexible Spending Accounts
  • Referral Bonuses
  • Performance Bonuses
  • Tuition Assistance for Education, Training, and Professional certifications
  • Career Development
Read More
Arrow Right
New

Exploitation Analyst

As cyber threats evolve and proliferate at a rapid pace, Altamira Technologies i...
Location
Location
United States , Augusta
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an associates degree
  • Relevant experience must be in computer or information systems design/development/analysis
  • Experience may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience/education requirement
  • In some cases, foreign language proficiency may also be used to satisfy experience requirements
  • recent Interagency Language Roundtable (ILR) scores are required to substantiate your proficiency level
  • Active TS/SCI with polygraph
  • Specific labor category determined by years of experience + educational degrees: Level 1: 2 years applicable experience with a bachelors degree, OR 4 years applicable experience with associate degree
  • Level 2: 2 years applicable experience with a PhD, OR 3 years applicable experience with a masters degree, OR 5 years applicable experience with a bachelors degree, OR 7 years applicable experience with an associate degree
Job Responsibility
Job Responsibility
  • Apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
Read More
Arrow Right