All Levels Target Digital Network Analyst (TDNA) – Multiple Locations


The selected candidate will:

  • Conduct advanced analysis of collection and open-source data to generate insights and leads
  • Ensure target continuity, profile targets and their activities, and develop techniques to gain additional target information
  • Maintain appropriate databases for targeting, tasking, and analysis
  • Identify intelligence gaps to tailor current collection or enable new collection to close the gaps
  • Employ multiple analysis disciplines such as pattern recognition against targets’ communications, network usage and digital footprints
  • Apply knowledge and understanding of IC needs and missions
  • Mentor other analysts on the tools and methodologies used to conduct TDNA
  • Apply curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings–including any new tradecraft–with teammates, stakeholders, and intelligence consumers
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.


Demonstrated experience/knowledge in one or more of the following areas:

  • Performing file signature analysis, real-time forensic analysis, and report intelligence-derived significant network events and intrusions
  • Building/maintaining subject matter expertise in an assigned substantive or functional area
  • Reviewing source reporting and raw intelligence to determine its value, significance, and relevance
  • Communicating assessments in operational- or strategic-level analytic intelligence products and through oral briefings
  • Performing threat analysis, to include assessments identifying and describing threat actors, activities, platforms, and targets—as well as how they interact—and providing an understanding of the presence, intent, and capabilities of the identified threats
  • Assessing how environmental variables may affect threats (known or emerging) in a domain
  • Understanding policies that govern all facets of cyberspace operations and advise leaders on how to posture analytic resources against mission requirements

Desired experience/knowledge in one or more of the following areas:

  • Certifications such as SANS GCTI, GNFA, GCIH, GXPN, GCIA, GREM, or GDAT; Offensive Security OSCP, OSWE, OSCE, OSEE; Cisco CyberOps, CCNA, CCNP; CompTIA CySA+, CASP, Security+, Network+; EC-Council CEH
  • Graduate of the Joint Cyber Analysis Course (JCAC)
  • Prior experience supporting Cyber Mission Force requirements


  • Liberal Arts field (e.g., English, History, Communications, Languages and Cultures, International Relations, and Political Science) are preferred, but a degree in any field is acceptable.
  • Information Technology or Information Systems degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a CS major.


  • Aspects of Intelligence Analysis (e.g., target development, social network analysis, metadata analysis, knowledge of customer tool sets and databases).
  • Foreign language proficiency may also be used to satisfy experience requirements.


Labor category level is based on years of experience combined with educational degrees (18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associate’s degree):

Level  Years Experience by Degree Type 
HS/GED  Associate  Bachelor  Master  Doctorate 
Level 1  6 4  2  2
Level 2  9
7  5  3  2 
Level 3  12
10  8  6  4 
Level 4  15
13  11  9  7 


Active Top Secret clearance with SCI eligibility and Polygraph


San Antonio, TX

Fort Meade, MD

Aurora, CO