Sign up for our
weekly
newsletter
of fresh jobs
Location: Fort Gordon, GACategory: Information TechnologyJob ID: CIS0002SKYour Impact:We are seeking Digital Network Exploitation Analysts (DNEA) for a variety of roles to support core Intelligence Community (IC) missions. As a cyber professional in the intelligence community, you will work as part of a team on the frontlines against our cyber adversaries.Responsibilities:• Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans.• Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.• Involved in developing new tradecraft needed to perform this analysis as technologies evolve.• Work together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.• Form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights• Distill, document, contextualize and share your findings–including any new tradecraft that you develop–with teammates, stakeholders, and intelligence consumers.#divergentHere’s what you’ll need:• Relevant experience must be in computer or information systems design/development/analysis.• In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.• Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience/education requirement (i.e., 24-week JCAC course will count as 6 months of experience).• In some cases, foreign language proficiency may also be used to satisfy experience requirements; recent Interagency Language Roundtable (ILR) scores are required to substantiate your proficiency level.Clearance Required:• TS/SCI w/PolyMinimum Education:• Technical Degree (additional experience, military training, or certifications can be substituted for degree)• Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics).• Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major.Minimum Years of Experience:• 10yrs with and Associates Degree• 8yrs with a Bachelor’s degree• 6yrs with a Master’s degree• 4yrs with a Doctorate degreePreferred:• Current on latest cyber threat tools, adversarial tactics and TTPs. and threats. Evaluate multiple operating systems for operational vulnerabilities.• Background in cyber offensive and defensive cyber methodologies. AMOD experience, must have used agency specific TTPS and tools ORFinancial Data Analysis experience ORPkswing, Protocol analysis, wireshark, XKS/fingerprintsAll qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.