All Levels Exploitation Analyst – Multiple Locations

FUNCTIONAL RESPONSIBILITY:

The selected candidate will:
*Provide expert analytic support against high value targets
*Collaborate with team members to identify access and collection gaps that can be satisfied through collection and/or preparation activities
*Leverage all authorized resources and analytic techniques to penetrate targeted networks
Create comprehensive strategies to develop and maintain accesses, conduct remote exploitation, and provide technical assistance
*Analyze intelligence information, technical data, and exploitation opportunities
*Communicate assessments in operational- or strategic-level analytic intelligence products and through oral briefings
*Apply curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
*Distill, document, contextualize and share findings–including any new tradecraft–with teammates, stakeholders, and intelligence consumers
*Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.

SKILLSET:

Demonstrated experience/knowledge in one or more of the following areas:
*Understanding network defenses and vulnerabilities in relation to available exploitation capabilities to create exploitation plans and make operational adjustments as the plan is executed
*Applying data and technical expertise to perform file signature analysis, real-time forensic analysis, and report intelligence-derived significant network events and intrusions
*Performing threat analysis which includes identifying and describing threat actors, activities, platforms, and targets-as well as how they interact-and providing an understanding of the presence, intent, and capabilities of the identified threats

Desired experience/knowledge in one or more of the following areas:
*Certifications such as SANS GCTI, GNFA, GCIH, GXPN, GCIA, GREM, or GDAT; Offensive Security OSCP, OSWE, OSCE, OSEE; Cisco CyberOps, CCNA, CCNP; CompTIA CySA+, CASP, Security+, Network+; EC-Council CEH
*Prior experience supporting Cyber Mission Force requirements

EDUCATION REQUIREMENTS:

*Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensic, Cyber Security, Software Engineering, Information Assurance, or Computer Security)

RELEVANT EXPERIENCE:

*Computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.
*Network or system administration.
*If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20-24 week courses will count as 6 months of experience, 10-14 weeks will count as 3 months of experience).

LABOR CATEGORIES:

Labor category level is based on years of experience combined with educational degrees (18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associate’s degree):

Years Experience by Degree Type
Level HS/GED Associate Bachelor Master Doctorate
Level 1 N/A 4 2
Level 2 N/A 7 5 3 2
Level 3 N/A 10 8 6 4
Level 4 N/A 13 11 9 7

SECURITY REQUIREMENTS:

Active Top Secret clearance with SCI eligibility and Polygraph

LOCATIONS:

San Antonio, TX
Fort Meade, MD
Aurora, CO