This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
As a Digital Network Exploitation Analyst, you will evaluate target opportunities, analyze SIGINT and cybersecurity data, develop new tradecraft, work as part of a team with government and military personnel, apply analytical talent to form hypotheses and share insights, and distill and document findings.
Job Responsibility:
evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans
analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network
be involved in developing new tradecraft needed to perform this analysis as technologies evolve
be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
Requirements:
Degree in Computer Science
Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in foundational CS areas
Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain equivalent coursework to a CS major
4 years’ applicable experience with a PhD
6 years’ applicable experience with a master’s degree
8 years’ applicable experience with a bachelor’s degree
10 years’ applicable experience with an associate degree
Computer or information systems design/development/analysis
Engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course)