The selected candidate will:
*Provide expert analytic support against high value targets
*Collaborate with team members to identify access and collection gaps that can be satisfied through collection and/or preparation activities
*Leverage all authorized resources and analytic techniques to penetrate targeted networks
Create comprehensive strategies to develop and maintain accesses, conduct remote exploitation, and provide technical assistance
*Analyze intelligence information, technical data, and exploitation opportunities
*Communicate assessments in operational- or strategic-level analytic intelligence products and through oral briefings
*Apply curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
*Distill, document, contextualize and share findings–including any new tradecraft–with teammates, stakeholders, and intelligence consumers
*Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.
Demonstrated experience/knowledge in one or more of the following areas:
*Understanding network defenses and vulnerabilities in relation to available exploitation capabilities to create exploitation plans and make operational adjustments as the plan is executed
*Applying data and technical expertise to perform file signature analysis, real-time forensic analysis, and report intelligence-derived significant network events and intrusions
*Performing threat analysis which includes identifying and describing threat actors, activities, platforms, and targets-as well as how they interact-and providing an understanding of the presence, intent, and capabilities of the identified threats
Desired experience/knowledge in one or more of the following areas:
*Certifications such as SANS GCTI, GNFA, GCIH, GXPN, GCIA, GREM, or GDAT; Offensive Security OSCP, OSWE, OSCE, OSEE; Cisco CyberOps, CCNA, CCNP; CompTIA CySA+, CASP, Security+, Network+; EC-Council CEH
*Prior experience supporting Cyber Mission Force requirements
*Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensic, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
*Computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.
*Network or system administration.
*If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20-24 week courses will count as 6 months of experience, 10-14 weeks will count as 3 months of experience).
Labor category level is based on years of experience combined with educational degrees (18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associate’s degree):
|Years Experience by Degree Type|
Active Top Secret clearance with SCI eligibility and Polygraph
San Antonio, TX
Fort Meade, MD