All Levels Digital Network Exploitation Analyst (DNEA) – Multiple Locations

FUNCTIONAL RESPONSIBILITY:

The selected candidate will:

  • Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans.
  • Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.
  • Develop new tradecraft needed to perform analysis as technologies evolve.
  • Apply curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insight.
  • Distill, document, contextualize and share findings–including any new tradecraft–with teammates, stakeholders, and intelligence consumers.
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.

SKILLSET:

Demonstrated experience/knowledge in one or more of the following areas:

  • Digital network analysis, characterization, or exploitation.
  • Intelligence collection capabilities and limitations, to include but not limited to technical sensors / platforms and human intelligence sources, SIGINT development (SIGDEV) or computer network provider capabilities and workflows, and technical metadata or content analysis.
  • Software applications and databases associated with network analysis and target development.
  • Computer networking and telecommunication architecture, the OSI model, communication protocols, and common hacker TTP.
  • TCP/IP, IPv6, routing concepts, network mapping, subnetting, and target templating.
  • Understanding policies that govern all facets of cyberspace operations and advise leaders on how to posture analytic resources against mission requirements.

Desired experience/knowledge in one or more of the following areas:

  • Certifications such as SANS GCTI, GNFA, GCIH, GXPN, GCIA, GREM, or GDAT; Offensive Security OSCP, OSWE, OSCE, OSEE; Cisco CyberOps, CCNA, CCNP; CompTIA CySA+, CASP, Security+, Network+; EC-Council CEH
  • Graduate of the Joint Cyber Analysis Course (JCAC)
  • Prior experience supporting Cyber Mission Force requirements

EDUCATION REQUIREMENTS:

Degree in one of the following degrees:

  • Computer Science
  • Information Technology (IT) or Information Security (IS)
  • Electronic Engineering, Electrical Engineering, Physics, or Mathematics

RELEVANT EXPERIENCE:

  • Computer or information systems design/development/analysis roles.
  • Engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
  • Graduate of the Joint Cyber Analysis Course (JCAC)

LABOR CATEGORIES:

Labor category level is based on years of experience combined with educational degrees (18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associate’s degree):

Level  Years Experience by Degree Type 
HS/GED  Associate  Bachelor  Master  Doctorate 
Level 1  N/A 4  2     
Level 2  N/A
7  5  3  2 
Level 3  N/A
10  8  6  4 
Level 4  N/A
13  11  9  7 

SECURITY REQUIREMENTS:

Active Top Secret clearance with SCI eligibility and Polygraph

LOCATIONS:

San Antonio, TX

Fort Meade, MD

Aurora, CO