This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Join us on this journey as we execute this mission-critical contract providing intelligence and cyber analysis support! Your effort and expertise are crucial to the success and execution of this impactful mission. This opportunity supports a team of Exploitation Analysts, Digital Network Exploitation Analysts, Target Digital Network Analysts, and Cyber Network Defense Analysts, responsible for improving, protecting, and defending our Nation’s Security.
Job Responsibility:
Evaluate target opportunities through comprehensive analysis of all-source data
Map target networks
Assist in the development of detailed exploitation and operational plans
Analyze SIGINT and cybersecurity data across various OSI network layers
Understand IP core infrastructure, communication devices, network connectivity, and traffic patterns
Develop new techniques as technology evolves
Collaborate with government, military, and contractor personnel to align on intelligence needs and mission relevance
Use curiosity and analytical skills to form hypotheses, select analysis methods, and integrate, evaluate, and interpret data to uncover insights
Document findings and newly developed techniques and share with teammates, stakeholders, and intelligence consumers
Requirements:
Experience in computer or information systems design, development, or analysis
Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or network and systems administration
An Associate’s Degree with 10 years of experience
A Bachelor’s Degree with 8 years of experience
A Master’s Degree with 6 years or experience
A PhD with 4 years of experience
A Degree in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics)
Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major
Position requires active Security Clearance with appropriate Polygraph
Nice to have:
Strong AMOD discovery skills and tool knowledge
Network analysis and mapping
Ability to identify connections between networks (protocols, routers, servers, satellites, cables, etc)
Analysis of exploitation opportunities for information systems, infrastructures, and information
Knowledge of tools used for exploitation and analysis of computer systems and network vulnerabilities
What we offer:
Medical: Three (3) rich healthcare options through CareFirst with 100% or majority company-paid premiums
Tax-advantaged health savings account available with generous employer contribution
Dental + Vision: 100% employer-paid for employees and family, with a buy-up option available