Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Exploitation Analyst *ALL LEVELS* image - Rise Careers
Job details

Exploitation Analyst *ALL LEVELS*

The Exploitation Analyst will collaborate to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.


Responsibilities:

·       Work on an integrated project team of analysts, operators, and developers conducting computer network operations

·       Analyze network device configuration files and collected metadata to understand target connectivity, build network maps, and triage packet data.

·       Use active and passive collection via NSA DNI & CNO tools to build network maps, identify opportunities for exploitation, and help build reliable collection pipelines.


Skills Requirements:

·       Experience working in CNO or TFO analyzing target network data & metadata.

·       Experience reading & analyzing network configuration files (e.g. routers, switches, firewalls) to understand network connectivity and identify opportunities for CNE.

·       Experience with NSA DNI & CNO analytic tools.

·       Extensive knowledge of the entire OSI model and understanding of network-related protocols 

·       Ability to work with technical operators in translating tasks and/or objectives to technical requirements


Nice to Haves:

·       Experience in CNO conducting operations and working with analysts, operators, and developers.

·       Understanding of multiple operating systems beyond Windows and Linux

·       Scripting/software development to help build automated analysis tools.


LEVEL 1: Bachelors Degree + 2 years of experience

LEVEL 2: Bachelors Degree + 5 years of experience

LEVEL 3: Bachelors Degree + 8 years of experience

LEVEL 4: Bachelors Degree + 11 years of experience


Degree Field: Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).


Average salary estimate

$90000 / YEARLY (est.)
min
max
$60000K
$120000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Exploitation Analyst *ALL LEVELS*, Link, LLC

Join our dynamic team as an Exploitation Analyst at a leading tech firm in Ft Meade, MD! Here, you will dive into the exciting world of cyber collection and analysis, collaborating with a talented group of analysts, operators, and developers. As an Exploitation Analyst, your mission will be to identify access and collection gaps that can be fulfilled through innovative cyber collection strategies. You’ll leverage authorized resources and analytic techniques to penetrate targeted networks effectively. Your day will involve analyzing network device configuration files and collected metadata, allowing you to build intricate network maps and triage packet data like a pro. We seek individuals at all levels, so whether you're just starting out in your career or have extensive experience, there’s a place for you here! You’ll need a Bachelor’s degree in Network Engineering, Information Technology, or a related field and varied years of experience depending on the level you’re applying for. If you're experienced with NSA DNI & CNO tools, have extensive knowledge of the OSI model, and enjoy working with technical operators, we’d love to meet you. Join us in our mission to enhance cyber operations and contribute to cutting-edge projects that make a difference!

Frequently Asked Questions (FAQs) for Exploitation Analyst *ALL LEVELS* Role at Link, LLC
What are the primary responsibilities of an Exploitation Analyst at this Ft Meade company?

As an Exploitation Analyst at our Ft Meade location, your main responsibilities will include collaborating with an integrated team to identify access and collection gaps, analyzing network device configuration files, and using active and passive collection techniques to enhance our cyber operations. You’ll be at the forefront of building network maps and identifying opportunities for exploitation, which are crucial for creating reliable collection pipelines.

Join Rise to see the full answer
What qualifications are required for the Exploitation Analyst position?

To qualify for the Exploitation Analyst position, candidates must have a Bachelor’s degree in Network Engineering, Systems Engineering, Information Technology, or a related field. Experience requirements vary by level: Level 1 requires 2 years, Level 2 requires 5 years, Level 3 needs 8 years, and Level 4 asks for 11 years of relevant experience in cyber operations and analysis.

Join Rise to see the full answer
Do I need prior experience with NSA DNI & CNO tools for the Exploitation Analyst role?

Yes, experience with NSA DNI & CNO analytic tools is highly beneficial for the Exploitation Analyst role. This experience enables you to effectively conduct analysis on target network data and metadata, which is essential for building comprehensive network maps and improving cyber collection strategies.

Join Rise to see the full answer
What skills should an ideal candidate possess for the Exploitation Analyst role?

An ideal candidate for the Exploitation Analyst role will have extensive knowledge of the OSI model and network-related protocols, experience reading and analyzing network configuration files, and the ability to communicate technical requirements effectively. Knowledge of multiple operating systems and scripting or software development is a plus!

Join Rise to see the full answer
What is the work environment like for an Exploitation Analyst in Ft Meade?

The work environment for an Exploitation Analyst in Ft Meade is collaborative and fast-paced. You will work closely with a diverse team of analysts, operators, and developers, engaging in meaningful discussions to tackle challenges in cyber operations and enhance security measures in an innovative setting.

Join Rise to see the full answer
Common Interview Questions for Exploitation Analyst *ALL LEVELS*
Can you describe your experience with computer network operations and analysis?

In responding to this question, focus on specific examples of your past roles where you were involved in computer network operations. Highlight any challenges you faced and the analytical techniques you employed to overcome them, showcasing your problem-solving skills.

Join Rise to see the full answer
What methods do you use to analyze network connectivity?

When discussing methods to analyze network connectivity, you can mention your experience with analyzing network device configuration files, creating network maps, and utilizing both active and passive collection techniques. This demonstrates your understanding of practical applications in this role.

Join Rise to see the full answer
How do you approach teamwork in a collaborative cyber operations environment?

Highlight specific experiences where you successfully collaborated with a team, explaining your communication strategies and how you contributed to the team’s objectives. Emphasize your adaptability and willingness to align with others in achieving shared goals.

Join Rise to see the full answer
What tools and technologies are you familiar with in cyber collection?

In answering this question, list the NSA DNI & CNO tools you have used, emphasizing your proficiency with each. Provide examples of how you employed these tools to achieve successful outcomes in your previous roles.

Join Rise to see the full answer
What challenges have you faced in cyber exploitation, and how did you address them?

Share specific challenges that were significant to your role and detail the analytical techniques or collaborative efforts you employed to overcome them. This shows your capability to handle pressure and find solutions in complex scenarios.

Join Rise to see the full answer
How do you keep up-to-date with developments in cyber security?

Your response should reflect a genuine interest in continuous learning. Mention relevant publications, online courses, webinars, or industry conferences that you follow to stay sharp in the ever-evolving cyber security landscape.

Join Rise to see the full answer
Can you provide an example of a successful project you led or contributed to?

Be prepared to discuss a specific project where you played a pivotal role. Detail your responsibilities, the outcomes of the project, and how it impacted your team or organization, showcasing your positives and contributions.

Join Rise to see the full answer
What do you understand about the OSI model and its importance?

Discuss your comprehension of the OSI model's seven layers, how they interact, and their significance in network communication. Emphasize its role in troubleshooting and understanding connectivity issues, which is crucial for an Exploitation Analyst.

Join Rise to see the full answer
How do you prioritize tasks when faced with multiple projects?

Describe your method for assessing project urgency and importance, such as using a prioritization matrix or other organizational tools. This demonstrates your time management skills and capacity to handle a busy workload.

Join Rise to see the full answer
What scripting languages or tools are you familiar with for automating tasks?

Share the programming languages you have experience with, particularly scripting languages like Python or Bash. Provide examples of how you have used automation to streamline processes or improve efficiency in your previous roles.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User

Join UChicago Medicine as an IAM Analyst to enhance security and optimize systems in a hybrid work environment.

Photo of the Rise User
Posted 6 days ago

Join Agendia as an IT Support Specialist I to enhance our technical support capabilities in the biotech sector.

Photo of the Rise User
Posted 13 days ago

Join DO & CO as an Application Support Specialist, where your skills will enhance our technical support and application management in a dynamic international environment.

Posted 5 days ago

Northeastern University is looking for an entry-level Security Admin I to assist in vital security operations across various domains.

Aambience Services Remote No location specified
Posted 2 days ago

Aambience Services seeks a self-motivated Senior RPA Developer to drive innovative automation solutions in a remote setting.

Posted 12 days ago

Seeking an Applications Engineer II to enhance clinical integration efforts at the Medical University of South Carolina.

Photo of the Rise User
Quontic Hybrid No location specified
Posted 7 days ago

Join Quontic Bank as an IT Analyst to provide crucial technical support and contribute to our mission of financial empowerment.

Photo of the Rise User
Datadog Hybrid Annapolis Junction, MD
Posted 7 days ago
Customer-Centric
Rapid Growth
Diversity of Opinions
Reward & Recognition
Friends Outside of Work
Inclusive & Diverse
Empathetic
Feedback Forward
Work/Life Harmony
Casual Dress Code
Startup Mindset
Collaboration over Competition
Fast-Paced
Growth & Learning
Open Door Policy
Rise from Within
Maternity Leave
Paternity Leave
Flex-Friendly
Family Coverage (Insurance)
Medical Insurance
Dental Insurance
Vision Insurance
Mental Health Resources
Life insurance
Disability Insurance
Health Savings Account (HSA)
Flexible Spending Account (FSA)
401K Matching
Paid Holidays
Paid Sick Days
Paid Time-Off

Join Omega Enterprise Solutions as an HPC SRE Engineer IV and leverage your expertise in site reliability engineering to support critical operations for the U.S. Department of Defense.

MATCH
VIEW MATCH
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
No info
HQ LOCATION
No info
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
April 14, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
LATEST ACTIVITY
Photo of the Rise User
Someone from OH, Elyria just viewed Security Officer - Factory Patrol at Allied Universal
C
14 people applied to ISSE/ ISSO at Centuria
Photo of the Rise User
Someone from OH, Cincinnati just viewed Staff Software Test Engineer, Platform at Clari
Photo of the Rise User
Someone from OH, Perrysburg just viewed Sourcing Leader, Minerals & Cullet at Owens Corning
Photo of the Rise User
Someone from OH, North Royalton just viewed Remote AI Voice Trainer (High-Quality Microphone Required) at Datadog
C
Someone from OH, Akron just viewed Phlebotomy Technician - Outpatient at CCF
Photo of the Rise User
Someone from OH, Solon just viewed Graphic Designer at Applause
Photo of the Rise User
Someone from OH, North Canton just viewed NodeJs developer at BlackStone eIT
Photo of the Rise User
Someone from OH, North Canton just viewed Software Development Engineer - Recent Grads Welcome at Sonos
Photo of the Rise User
16 people applied to SOC Analyst I at CBIZ
Photo of the Rise User
Someone from OH, Dayton just viewed Data Entry and Word Processing at MoxieIT
Photo of the Rise User
Someone from OH, Dayton just viewed Content Developer - Intern at Big Ideas Learning