Location
Maryland | United States
Job description
We are seeking Exploitation Analysts (EAs) of all skill levels for a variety. Our national security depends on technology as never before, and this dependence is growing at an ever-increasing rate. As a cyber professional in the intelligence community, you will work as part of a team on the frontlines against our cyber adversaries. We need cyber professionals with technical expertise and a driving desire to remain at the forefront of their field. These opportunities will give you the chance to showcase your talent and expertise while working on the cutting edge of national cybersecurity missions. Join us in helping advance our national security interests as part of the world’s most advanced team of cyber professionals.
GENERAL DUTIES:
- Apply your deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed.
- Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.
- Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights.
- Distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers.
REQUIRED QUALIFICATIONS:
- Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Note that 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an Associate degree.
- Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will count as 6 months of experience). In some cases, foreign language proficiency may also be used to satisfy experience requirements; recent Interagency language Roundtable (ILR) scores are required to substantiate your proficiency level.
CLEARANCE:
- Full Scope Polygraph minimum
Job tags
Salary