CrawlJobs Logo

Exploitation Analyst, Lead

boozallen.com Logo

Booz Allen Hamilton

Location Icon

Location:
United States , Annapolis Junction

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

112800.00 - 257000.00 USD / Year

Job Description:

As a computer network operations (CNO) specialist, you know that embedded and application developers, reverse engineers, and vulnerability analysts all play key roles in the CNO capability development lifecycle. We’re looking for someone like you to flex your problem-solving prowess in a rapidly evolving systems security research and development environment. As a lead CNO capability development specialist on our team, you’ll oversee full project lifecycles. Leading an agile team of professionals, you’ll guide reverse engineering and vulnerability analyses on a range of software problems. You’ll inform operational parameters for complex systems, as well as leverage artificial intelligence and machine learning to influence the delivery of your work. Using your network operations expertise, you’ll determine what the art of the possible is and what can be done—and then you’ll bring it to life for your clients. Help us combat the most advanced adversaries and defend national security.

Job Responsibility:

  • Oversee full project lifecycles
  • Lead an agile team of professionals
  • Guide reverse engineering and vulnerability analyses on a range of software problems
  • Inform operational parameters for complex systems
  • Leverage artificial intelligence and machine learning to influence the delivery of your work
  • Determine what the art of the possible is and what can be done—and then bring it to life for your clients

Requirements:

  • 8+ years of experience with computer network operations capability development and engineering services, including defense and exploitation to gain strategic advantages
  • Experience with leading-edge principles, theories, and concepts
  • Experience with advanced software development, analytic development, and DevOps techniques for malware variants, advancing crypt capabilities, and emerging unknown protocols
  • Experience gathering requirements and designing and developing approaches for product security and resilience cryptographic solutions and anti-forensic measures
  • Experience with indigenous and vendor proprietary protocols
  • Experience using automation and virtualization to deploy, maintain, and sustain capabilities, developing and executing strategies for countering or mitigating environmental challenges, security and policy constraints, and system or architecture limitations
  • TS/SCI clearance with a polygraph
  • Bachelor’s degree

Nice to have:

  • 5+ years of experience in telecommunications operations, computer network operations, SIGINT collection operations, information security (INFOSEC) or information assurance, or research and development
  • 5+ years of experience with computer programming in C, C++, Python, Assembly, or PerlScript
  • 2+ years of experience in computer engineering, computer science, electronic and electrical engineering, or applied mathematics
  • 2+ years of experience in big data platforms, black box testing, cloud computing, disassembly, or Global Telecommunications System Architectures & Protocols, Protocol Analysis, SCADA Design and systems, software debugging, streaming analytics, vulnerability management, or mitigation
  • Experience in embedded systems programming, exploit development, and malware reverse engineering
  • Experience with Unix, Linux, RTOS, or Wind River VxWorks
What we offer:
  • Health, life, disability, financial, and retirement benefits
  • Paid leave
  • Professional development
  • Tuition assistance
  • Work-life programs
  • Dependent care
  • Recognition awards program

Additional Information:

Job Posted:
January 07, 2026

Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Exploitation Analyst, Lead

Exploitation Analyst, Senior

As a computer network operations (CNO) specialist, you know that embedded applic...
Location
Location
United States , Annapolis Junction
Salary
Salary:
112800.00 - 257000.00 USD / Year
boozallen.com Logo
Booz Allen Hamilton
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 8+ years of experience with computer network operations capability development and engineering services, including defense and exploitation to gain strategic advantages
  • Experience with leading-edge principles, theories, and concepts
  • Experience with advanced software development, analytic development, and DevOps techniques for malware variants, advancing crypt capabilities, and emerging unknown protocols
  • Experience gathering requirements and designing and developing approaches for product security and resilience cryptographic solutions and anti-forensic measures
  • Experience with indigenous and vendor proprietary protocols
  • Experience using automation and virtualization to deploy, maintain, and sustain capabilities and developing and executing strategies for countering or mitigating environmental challenges, security and policy constraints, and system or architecture limitations
  • TS/SCI clearance with a polygraph
  • Bachelor’s degree
Job Responsibility
Job Responsibility
  • Support full project lifecycles
  • Guide an agile team of professionals
  • Manage reverse engineering and vulnerability analysis on a range of software problems
  • Inform operational parameters for complex systems
  • Leverage artificial intelligence and machine learning to influence the delivery of your work
  • Determine what the art of the possible is and what can be done—and then bring it to life for your clients
  • Help combat the most advanced adversaries and defend national security
What we offer
What we offer
  • Health, life, disability, financial, and retirement benefits
  • Paid leave
  • Professional development
  • Tuition assistance
  • Work-life programs
  • Dependent care
  • Recognition awards program
Read More
Arrow Right

Merchant and Loyalty Rewards Integrity Manager Senior Vice President

The Merchant and Rewards Integrity Manager will lead enterprise efforts to stren...
Location
Location
United States , Jacksonville; San Antonio; O'Fallon; Tampa; Florence; Johnson City; Sioux Falls; New Castle
Salary
Salary:
130880.00 - 196320.00 USD / Year
https://www.citi.com/ Logo
Citi
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 10+ years relevant experience
  • Experience in fraud risk, business impersonation, merchant fraud, product risk, payments, and rewards and loyalty ecosystems, payment
  • Experience with product management or product risk is desirable.
  • Expertise in the following would be beneficial: Fraud Awareness and Risk Management Operations and Systems (Information Security Standards, Vendor/Outsourcing Management and MCA Legal and Regulatory Compliance Management of a global operations and a complex environment that includes global teams.
  • Excellent communication skills – verbal & written
  • Bachelor’s/University degree, Master’s degree preferred
Job Responsibility
Job Responsibility
  • Lead and develop a multidisciplinary team of data scientists, data analysts, and fraud strategy professionals.
  • Strengthen merchant and rewards risk controls to detect, analyze, and enhance enterprise safeguards related to merchant impersonation, inauthentic business entities, loyalty rewards exploitation.
  • Lead data scientists in developing and optimizing behavioral anomaly detection, fraud detection, and entity linkage and network analysis,
  • Translate risk typologies into scalable detection strategies
  • Improve precision and recall of merchants and rewards monitoring controls.
  • Establish measurable performance indicators across merchant and rewards risk domains.
  • Oversee intelligence monitoring across digital channels and relevant marketplaces to identify emerging merchant and rewards trends and exploitation patterns
  • Partner with Product and Marketing Teams to embed risk considerations into launches and promotions.
  • Appropriately assess risk when business decisions are made, demonstrating particular consideration for the firm's reputation and safeguarding Citigroup, its clients and assets, by driving compliance with applicable laws, rules and regulations, adhering to Policy, applying sound ethical judgment regarding personal behavior, conduct and business practices, and escalating, managing and reporting control issues with transparency, as well as effectively supervise the activity of others and create accountability with those who fail to maintain these standards.
What we offer
What we offer
  • medical, dental & vision coverage
  • 401(k)
  • life, accident, and disability insurance
  • wellness programs
  • paid time off packages, including planned time off (vacation), unplanned time off (sick leave), and paid holidays
  • Fulltime
Read More
Arrow Right

Network Exploitation Analyst

As a network exploitation professional, you know that understanding the adversar...
Location
Location
United States , Annapolis Junction
Salary
Salary:
86900.00 - 198000.00 USD / Year
boozallen.com Logo
Booz Allen Hamilton
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 8+ years of experience with signals intelligence
  • Experience with CNO, CNA, CND, or CNE processes and capabilities
  • Experience with network analysis, network exploitation, protocol analysis, and target network topology development
  • Experience in a high-paced telecommunications and signals analysis environment using analytical tools such as PktSwing or Wireshark
  • Experience with scripting languages such as Python
  • Knowledge of the protocols within TCP and IP suite
  • Knowledge of network infrastructure and routing protocols, including conducting computer network-based research and analysis
  • Ability to parse, research, analyze, and fuse complex data sets and generate leads to advance dynamic objectives collection and analysis
  • TS/SCI clearance with a polygraph
  • HS diploma or GED
Job Responsibility
Job Responsibility
  • Provide expert analytic support while working alongside the mission owners to tackle complex and challenging problems in computer network analysis, network exploitation, digital network intelligence, dataflow, access development, and target network analysis
  • Leverage an understanding of ports, protocols, networking devices
  • Use and share your methodologies and tool experience with other analysts
  • Be a part of a team conducting offensive cyberspace operations that are crucial to national security
What we offer
What we offer
  • Health, life, disability, financial, and retirement benefits
  • Paid leave
  • Professional development
  • Tuition assistance
  • Work-life programs
  • Dependent care
  • Recognition awards program
Read More
Arrow Right
New

Expert Threat Intelligence Analyst - Central Technology

Call of Duty is one of the most iconic and successful video game franchises in t...
Location
Location
United States , Sherman Oaks
Salary
Salary:
97200.00 - 179900.00 USD / Year
activision.com Logo
Activision
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 8+ years of experience in game security, anti-cheat, fraud/abuse, or adversarial systems
  • Demonstrated experience investigating and disrupting complex adversarial behaviors or ecosystems
  • Experience working with large-scale telemetry, behavioral datasets, or player activity data
  • Familiarity with tools and workflows used to analyze player behavior, enforcement outcomes, and live service data
  • Proven ability to translate analytical findings into concrete outcomes (e.g., detections, enforcement actions, or design changes)
  • Strong written and verbal communication skills, including the ability to clearly present findings to both technical and non-technical audiences
  • Experience influencing cross-functional partners and driving alignment without direct authority
  • Ability to operate independently in ambiguous, fast-moving environments
  • Bachelor’s degree in a relevant field or equivalent professional experience
  • Strong analytical thinking and problem-solving skills applied to adversarial or behavioral systems
Job Responsibility
Job Responsibility
  • Lead complex investigations into cheat providers, exploit abuse, and organized player misconduct
  • Analyze in-game telemetry, behavioral data, and enforcement outcomes to identify patterns and opportunities
  • Monitor and assess cheat communities, marketplaces, and distribution channels
  • Develop detailed profiles of cheat ecosystems, including key actors, tools, and monetization models
  • Translate intelligence into actionable outputs such as detection opportunities, enforcement strategies, and product recommendations
  • Partner closely with engineering and data teams to ensure insights are operationalized into systems and models
  • Support enforcement operations with high-confidence intelligence that improves targeting and accuracy
  • Identify emerging threats and proactively recommend mitigation strategies before they scale
  • Contribute to the development of intelligence processes, standards, and best practices
  • Mentor other analysts and raise the overall quality and rigor of investigations
What we offer
What we offer
  • Medical, dental, vision, health savings account or health reimbursement account, healthcare spending accounts, dependent care spending accounts, life and AD&D insurance, disability insurance
  • 401(k) with Company match, tuition reimbursement, charitable donation matching
  • Paid holidays and vacation, paid sick time, floating holidays, compassion and bereavement leaves, parental leave
  • Mental health & wellbeing programs, fitness programs, free and discounted games, and a variety of other voluntary benefit programs like supplemental life & disability, legal service, ID protection, rental insurance, and others
  • Relocation assistance
  • Fulltime
Read More
Arrow Right

Threat Investigator, Security Analyst - Youth Safety, i3E

The Integrity, Investigations, Intelligence and Events (i3E) teams at Meta are d...
Location
Location
United States , Bellevue
Salary
Salary:
111000.00 - 162000.00 USD / Year
meta.com Logo
Meta
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 2+ years work experience performing security investigations in government, intelligence, cyber security, journalism and/or private sector organizations
  • Subject matter expertise or prior work experience in child safety based laws or policies (i.e intelligence, law enforcement, legal analysis, or NGO)
  • Experience with open source investigation techniques and familiarity with a variety of internet research tools
  • Experience leveraging SQL, OSINT, and network security concepts in an investigative context
  • Adept at developing multi-source, evidence-based findings and communicating them to varied audiences
  • Bachelors Degree in Computer Science, Information Systems, Intelligence Studies, Cybersecurity or related field or equivalent work experience in information security
Job Responsibility
Job Responsibility
  • Investigate complex child sexual exploitation operations to understand how abuse manifests on Meta’s platforms and the wider information ecosystem
  • Lead a portfolio of investigative research to include identifying abuse trends, understanding adversarial behavior, and designing forward-looking enforcement strategies to mitigate harm
  • Proactively hunt for threats and undetected abuse by leveraging internal data sets, open-source intelligence, and third-party private intelligence
  • Analyze qualitative and quantitative data to advance investigations, quantify trends and support findings with clear, concise evidence
  • Apply analytical rigor to investigations, analysis, and programs while looking for strategic improvement opportunities
  • This role involves exposure to graphic and/or objectionable content including but not limited to graphic images, videos and writings, offensive or derogatory language, and other potential objectionable material, i.e. child exploitation, graphic violence, self-injury, animal abuse, and other content which may be considered offensive or disturbing
What we offer
What we offer
  • bonus
  • equity
  • benefits
Read More
Arrow Right

Senior Technical Product Marketing Manager

We’re looking for a Senior Technical Product Marketing Manager who can define an...
Location
Location
United States
Salary
Salary:
160000.00 - 200000.00 USD / Year
xbow.com Logo
Xbow
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Degree in a technical field or equivalent hands-on experience
  • Significant experience in product marketing, preferably in cybersecurity, developer tools, or infrastructure platforms
  • Strong technical foundation in application security, vulnerability management, or offensive security concepts
  • Ability to understand and explain AI/ML-driven systems in practical, security-relevant terms
  • Proven experience translating complex technical products into clear positioning and messaging
  • Deep curiosity—you want to know how things actually work under the hood
  • Excellent written and verbal communication skills, from technical deep dives to executive-level narratives
  • Experience working cross-functionally with Product, Engineering, Research, and Sales
  • Data-driven mindset with the ability to incorporate customer insights and market feedback into strategy
Job Responsibility
Job Responsibility
  • Own technical product positioning and messaging for XBOW’s autonomous offensive security platform and key capabilities
  • Develop and maintain technical narratives that clearly differentiate XBOW from legacy pentesting, scanners, and emerging AI security tools
  • Continuously assess competitive landscape and develop associated counter-positioning to support sales enablement and associated artifacts (i.e, sales battle cards, competitive campaigns, etc.)
  • Partner closely with Product and Security Research to deeply understand roadmap, vulnerability coverage, exploitation techniques, and AI learning systems
  • Translate technical innovation into customer-facing artifacts: launch messaging, solution briefs, whitepapers, blogs, demos, and sales enablement
  • Lead product launches from beta to GA, including messaging, packaging, pricing input, and cross-functional readiness
  • Build technical enablement for Sales, Solutions Engineering, and Customer Success
  • Develop and consistently evaluate pricing and packaging of XBOW offerings to market
  • Work directly with customers to capture proof points, use cases, and real-world impact stories to develop ROI calculations and value measurements
  • Support analyst relations and technical briefings with clear, defensible narratives
What we offer
What we offer
  • Competitive salary and equity package, making you a true owner of the company
  • Career Growth: Shape the product marketing function and grow with the company as we define a new security category
  • Meaningful Work: Tackle technically complex challenges and play a pivotal role in how AI transforms cybersecurity, alongside world-class researchers and builders
  • Fulltime
Read More
Arrow Right

Cybersecurity Operations Analyst II

Piper Companies is seeking a Cybersecurity Operations Analyst II to join a growi...
Location
Location
Salary
Salary:
120000.00 - 140000.00 USD / Year
pipercompanies.com Logo
Piper Companies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience in Security Operations, Incident Response, Threat Detection, or a related field
  • Hands-on experience with SIEM, EDR, and network security technologies
  • Strong understanding of threat actors, attack techniques (MITRE ATT&CK), and security best practices
  • Ability to analyze logs, packets, system telemetry, and behavioral indicators
  • Excellent communication skills, written and verbal
Job Responsibility
Job Responsibility
  • Monitor and triage alerts from SIEM, EDR, email security, and network monitoring tools
  • Investigate escalated events from MSSPs or automated detections
  • Conduct threat hunting activities leveraging IOCs, suspicious patterns, and cyber threat intelligence
  • Lead response activities for medium-to-high severity security incidents
  • Perform root cause analysis and develop detailed post-incident reports
  • Collaborate with IT and business teams to contain, eradicate, and recover from threats
  • Maintain and tune SIEM, EDR, and additional security tools to improve detection accuracy
  • Build and refine custom detection rules, dashboards, alerts, and reporting capabilities
  • Oversee the vulnerability management lifecycle, including scanning, analysis, prioritization, and remediation tracking
  • Validate and categorize vulnerabilities based on exploitability and business impact
  • Fulltime
Read More
Arrow Right
New

Vulnerability Management Analyst

The Vulnerability Management Analyst is responsible for supporting and advancing...
Location
Location
United States
Salary
Salary:
85000.00 - 100000.00 USD / Year
radancy.com Logo
Radancy
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ years of experience in vulnerability management, GRC, security operations, or a related cybersecurity function.
  • Experience supporting vulnerability management in cloud and modern application environments.
  • Experience working with vulnerability and security tooling.
  • Strong understanding of vulnerability remediation, risk prioritization, compensating controls, exception handling, and escalation practices.
  • Ability to translate technical findings into business risk and remediation priorities for both technical and non-technical stakeholders.
  • Demonstrated experience coordinating across engineering, product, and management teams.
  • Strong analytical, organizational, and facilitation skills.
  • Excellent written and verbal communication skills.
Job Responsibility
Job Responsibility
  • Lead recurring vulnerability management roundtables with product engineering and IT departments.
  • Prepare and present prioritized vulnerability reviews for monthly meetings, driving clear remediation priorities for the next review cycle, focus teams on the highest risk vulnerabilities first.
  • Apply risk-based prioritization. Evaluate exploitability, exposure, and business impact to determine severity.
  • Promote remediation efforts that reduce risk across multiple teams or systems.
  • Track critical and high-risk findings against remediation timelines. Surface items nearing or exceeding SLA commitments.
  • Ensure each issue has a current remediation or mitigation plan and manage the timeline of remediation efforts.
  • Challenge unsupported “can’t fix” or “won’t fix” responses. Push for practical remediation paths when blockers exist.
  • Recommend compensating controls where full remediation is delayed.
  • Support formal exception and risk acceptance decisions.
  • Escalate stalled remediation and SLA risk to leadership.
What we offer
What we offer
  • Comprehensive medical coverage, with dental, vision and life insurance
  • Competitive 401(k) plan with employer matching
  • Unlimited flexible time off (FTO)
  • World-class training that keeps you at the forefront of innovation
  • Fulltime
Read More
Arrow Right