This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
As a Digital Network Exploitation Analyst, you will evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans. You will analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network. You will be involved in developing new tradecraft needed to perform this analysis as technologies evolve. You will be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise. You will apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights. You will distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers.
Job Responsibility:
Evaluate target opportunities using all source data to understand and map target networks
Assist in developing detailed exploitation and operations plans
Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack
Bring understanding of logical/physical IP core infrastructure, communication devices, network connections, and traffic movements
Develop new tradecraft needed to perform analysis as technologies evolve
Work as part of a team with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
Apply curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
Distill, document, contextualize and share findings--including any new tradecraft developed--with teammates, stakeholders, and intelligence consumers
Requirements:
Degree in Computer Science or related fields (e.g., Engineering, Mathematics) with concentration in foundational CS areas: algorithms, computer architecture, programming methodologies and languages, data structures, logic and computation, and advanced mathematics
Information Technology (IT) and Information Security (IS) degrees may be considered if equivalent to CS major
2 years’ applicable experience with a bachelor’s degree OR 4 years’ applicable experience with associate degree
Relevant experience in computer or information systems design/development/analysis roles
Experience may include engineering hardware/software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, network/systems administration
Completion of military training in relevant area (e.g., JCAC) may count toward experience