All Levels Exploitation Analyst (EA) – Multiple Locations


The selected candidate will:

  • Provide expert analytic support against high value targets
  • Collaborate with team members to identify access and collection gaps that can be satisfied through collection and/or preparation activities
  • Leverage all authorized resources and analytic techniques to penetrate targeted networks
  • Create comprehensive strategies to develop and maintain accesses, conduct remote exploitation, and provide technical assistance
  • Analyze intelligence information, technical data, and exploitation opportunities
  • Communicate assessments in operational- or strategic-level analytic intelligence products and through oral briefings
  • Apply curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings–including any new tradecraft–with teammates, stakeholders, and intelligence consumers
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise


Demonstrated experience/knowledge in one or more of the following areas:

  • Understanding network defenses and vulnerabilities in relation to available exploitation capabilities to create exploitation plans and make operational adjustments as the plan is executed
  • Applying data and technical expertise to perform file signature analysis, real-time forensic analysis, and report intelligence-derived significant network events and intrusions
  • Performing threat analysis which includes identifying and describing threat actors, activities, platforms, and targets-as well as how they interact-and providing an understanding of the presence, intent, and capabilities of the identified threats

Desired experience/knowledge in one or more of the following areas:

  • Certifications such as SANS GCTI, GNFA, GCIH, GXPN, GCIA, GREM, or GDAT; Offensive Security OSCP, OSWE, OSCE, OSEE; Cisco CyberOps, CCNA, CCNP; CompTIA CySA+, CASP, Security+, Network+; EC-Council CEH
  • Prior experience supporting Cyber Mission Force requirements


  • Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensic, Cyber Security, Software Engineering, Information Assurance, or Computer Security)


  • Computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.
  • Network or system administration.
  • If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20-24 week courses will count as 6 months of experience, 10-14 weeks will count as 3 months of experience).


Labor category level is based on years of experience combined with educational degrees (18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associate’s degree):

Level  Years Experience by Degree Type 
HS/GED  Associate  Bachelor  Master  Doctorate 
Level 1  N/A  4  2     
Level 2  N/A  7  5  3  2 
Level 3  N/A  10  8  6  4 
Level 4  N/A  13  11  9  7 


Active Top Secret clearance with SCI eligibility and Polygraph


San Antonio, TX

Fort Meade, MD

Aurora, CO