This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Evaluate target opportunities using all source data to understand and map target networks
Assist in developing detailed exploitation and operations plans
Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack
Bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network
Be involved in developing new tradecraft needed to perform this analysis as technologies evolve
Work as part of a team with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
Distill, document, contextualize and share findings--including any new tradecraft developed--with teammates, stakeholders, and intelligence consumers
Requirements:
Degree in Computer Science or related fields (e.g., Engineering, Mathematics) with concentration in foundational CS areas
Information Technology (IT) and Information Security (IS) degrees considered if equivalent to CS major
4 years’ applicable experience with a PhD
6 years’ applicable experience with a master’s degree
8 years’ applicable experience with a bachelor’s degree
10 years’ applicable experience with an associate degree
Relevant experience in computer or information systems design/development/analysis roles
Completion of military training in a relevant area such as JCAC may be considered
Solid understanding of how to gain access into target networks
Strong verbal and written communication skills
Intermediate/Advance use of Agency tools
Knowledge on how to exploit network vulnerabilities (software & hardware)