Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Digital Network Exploitation Analyst 3 image - Rise Careers
Job details

Digital Network Exploitation Analyst 3 - job 1 of 3

At Wyetech, you’ll be at the center of an award-winning corporate culture, breaking technological barriers and solving real-world problems for our federal government customers. We are committed to hiring the best of the best, and in return, we offer a world-class, truly unique employee experience that is rare within our industry.


DNEA with strong AMOD experience.  Needs to be able to operate independently, understand customer needs and pursue the development of unique accesses in support of those needs.  Key skills include:


-expert  in PKTSWING/WIRESHARK


-strong XKS


-strong RENOIR or other graphics visualization tool


-expert in protocol analysis


-strong understanding of layers 2-5 of TCP/IP model


-expert in network addressing (MAC, IPv4, IPv6, public/private, unicast/multicast/broadcast


-expert in layers2-3 of TCP/IP model


-expert in routing/switching protocols (DNS, BGP, IGP, ISIS, MPLS, OSPF, RIP, RSVP, VLAN)


-strong understanding of tunneling protocols (ESP, GRE, IKE, L2TP, PPTP, VPN)


Due to federal contract requirements, United States Citizenship and position appropriate security clearance is required. (e.g. Active TS/SCI security clearance with agency appropriate polygraph).


Required Qualifications
  • TS/SCI with agency appropriate poly
  • Ten (10) years of experience and an Associate's Degree in Degree in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics).
OR
  • Eight (8) years of experience and an Bachelor's Degree in Degree in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics).
OR
  • Six (6) years of experience and an Master's Degree in Degree in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics).
OR
  • Four (4) years of experience and an Doctorate Degree in Degree in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics).


Relevant Experience
  • Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will count as 6 months of experience).
  • Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major.


Required Technical Skills
  • XKS, COSMIC, PLATINUMSTAR, PICTUREPOSTCARD, PREOPERORDER, REFLECTINGPOOL, SILENTVIEW, SPYGLASS, TWISTEDPATH, UTT, DX, DNI Presenter, GENESIS, LOPERS, Targeting, Collection Requirements, Network Analysis, Dataflow, Collection Metrics, SIGDEV/Discovery, Encryption, CNO shaping


The Benefits Package
  • Wyetech believes in generously supporting employees as they prepare for retirement. The company automatically contributes 20% of each employee's gross compensation to a Simplified Employee Pension (SEP) IRA, with no requirement for employee matching. All contributions are fully vested from day one, ensuring immediate ownership of retirement funds. 

Additional benefits include:
  • Wyetech provides a generous PTO plan of up to 200 hours annually, aligned with applicable state leave regulations. Employees have the flexibility to adjust their PTO allocation at the start of each calendar year, ensuring it meets their evolving needs.

Full-time employees have the option to participate in a variety of voluntary benefit plans including:
  • A Choice of Medical Plan Options, some with Health Savings Account (HSA)
  • Vision and Dental
  • Life and AD&D Benefits
  • Short and Long-Term Disability
  • Hospital Indemnity, Accident, and Critical Illness Insurances
  • Optional Identity Theft and Legal Protection Services


Company Environment & Perks
  • Employee Referral Bonus Eligibility up to $10,000 
  • Mobility Among Wyetech-supported Contracts 
  • Various contract and work locations throughout Maryland, Virginia, Colorado, Texas, Utah, Alaska, Hawaii and OCONUS
  • Various team-building events throughout the year such as: monthly lunches, summer company picnic, and an annual holiday party. 
  • Employees receive two complementary branded clothing orders annually.


$58.51 - $91.70 an hour
Pay Range: $58.51 - $91.70 per hour*
Hourly pay rates listed for this position serve as a general guideline and are not a guarantee of compensation. Compensation will vary dependent upon factors including but not limited to: Government contract rates; education; relevant prior work experience, knowledge, skills, and competencies; certifications, and geographic location. *Hourly pay rates reflect the pre-benefit gross wage amounts.

Wyetech, LLC is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. 


Affirmative Action Statement:

Wyetech, LLC is committed to the principles of affirmative action in all hiring and employment for minorities, women, individuals with disabilities, and protected veterans.


Accommodations:

Wyetech, LLC is committed to providing an inclusive and accessible hiring process. If you need any accommodations during the application or interview process, please contact David Schroeder, Jr. at 844-WYETECH x727 or staffing@wyetech.com. We are happy to provide reasonable accommodations to ensure equal access to all candidates. 

Wyetech Glassdoor Company Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
Wyetech DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of Wyetech
Wyetech CEO photo
Unknown name
Approve of CEO

Average salary estimate

$155.5 / YEARLY (est.)
min
max
$121K
$190K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Digital Network Exploitation Analyst 3, Wyetech

Join Wyetech as a Digital Network Exploitation Analyst 3 and be part of an innovative team that breaks technological barriers while supporting critical needs for federal government customers right in Annapolis Junction, Maryland. At Wyetech, we pride ourselves on having an award-winning corporate culture that promotes collaboration, creativity, and excellence. As a Digital Network Exploitation Analyst, you'll utilize your expertise in tools like PKTSWING and WIRESHARK, along with your strong understanding of TCP/IP layers and network protocols, to develop unique access solutions that align with customer requirements. You should be prepared to operate independently, pursue innovative ideas, and enhance existing methodologies with cutting-edge protocol analysis and visual tools like RENOIR. Your experience should reflect a deep understanding of routing/switching protocols and tunneling techniques. Wyetech is committed to hiring the best minds, and in return, offers an exceptional employee experience, competitive benefits, and a chance to make a true impact in the cybersecurity landscape. With a focus on both professional development and community, you’ll have the opportunity to grow alongside experts in the field. If you're eager to engage in challenging projects and leverage your technical acumen to solve real-world problems, Wyetech invites you to explore a career with us that’s not just a job, but a journey of growth, learning, and excellence.

Frequently Asked Questions (FAQs) for Digital Network Exploitation Analyst 3 Role at Wyetech
What are the main responsibilities of a Digital Network Exploitation Analyst 3 at Wyetech?

As a Digital Network Exploitation Analyst 3 at Wyetech, your main responsibilities will include performing complex network analysis to identify vulnerabilities, developing unique access solutions for clients, and utilizing tools like PKTSWING and WIRESHARK for in-depth protocol analysis. Additionally, you’ll need to ensure that your work aligns with federal requirements while maintaining client confidentiality and security.

Join Rise to see the full answer
What qualifications do I need to apply for the Digital Network Exploitation Analyst 3 position at Wyetech?

To apply for the Digital Network Exploitation Analyst 3 position at Wyetech, you will need a TS/SCI security clearance with an agency-appropriate polygraph, along with significant experience ranging from four to ten years based on your educational background. A degree in Computer Science or a related field is essential, along with experience in computer systems design and analysis.

Join Rise to see the full answer
What skills are necessary for success as a Digital Network Exploitation Analyst 3 at Wyetech?

Successful Digital Network Exploitation Analysts 3 at Wyetech possess expertise in network analysis tools like XKS and RENOIR, a strong comprehension of TCP/IP layers, and proficiency in routing/switching protocols. Knowledge of tunneling protocols and experience with penetration testing or cybersecurity practices is also crucial for this role.

Join Rise to see the full answer
How does Wyetech support employee development for Digital Network Exploitation Analyst 3 roles?

Wyetech supports employee development for Digital Network Exploitation Analyst 3 roles through continuous learning opportunities, mentorship programs, and various team-building events. The company's culture emphasizes professional growth, allowing employees to attend relevant trainings and engage in innovative projects within a supportive environment.

Join Rise to see the full answer
What benefits does Wyetech offer to its Digital Network Exploitation Analyst 3 employees?

Wyetech offers a comprehensive benefits package for Digital Network Exploitation Analyst 3 employees, including a generous retirement contribution, flexible PTO, health and wellness plans, and an inclusive workplace culture. Employees also benefit from various voluntary programs and team-building events throughout the year.

Join Rise to see the full answer
Common Interview Questions for Digital Network Exploitation Analyst 3
Can you explain your experience with network protocols relevant to the Digital Network Exploitation Analyst 3 position?

In responding to this question, provide specific examples of how you have utilized networking protocols in past roles. Discuss your familiarity with DNS, BGP, and other routing protocols, and illustrate how your understanding contributed to successful network analyses or solutions in previous projects.

Join Rise to see the full answer
How do you prioritize tasks when handling multiple projects as a Digital Network Exploitation Analyst?

It's important to demonstrate your organizational skills and ability to manage time effectively. Describe your approach to prioritizing tasks based on urgency and impact, and give an example of a time when you successfully balanced multiple competing deadlines.

Join Rise to see the full answer
What strategies do you use for protocol analysis and to identify potential network vulnerabilities?

Detail your methodological approach to protocol analysis, including the tools you utilize, like WIRESHARK. Give examples of how you have previously identified vulnerabilities and the steps taken to remediate them or develop preventative measures.

Join Rise to see the full answer
Describe a challenging technical problem you faced in a previous role and how you resolved it.

Choose a situation where you encountered a significant technical challenge relevant to network exploitation. Outline your problem-solving process, including any collaborative efforts, and emphasize the successful outcome and what you learned.

Join Rise to see the full answer
In your opinion, what is the most significant current challenge in network security?

Show your awareness of the industry by discussing current trends such as cybersecurity threats, evolving technology, or regulatory changes impacting network security. Share your perspective on how these challenges can be approached and resolved.

Join Rise to see the full answer
How do you stay current with advancements in network technologies and security protocols?

Discuss the resources you use to keep informed, such as attending conferences, following relevant journals, and participating in online courses or forums. Mention any recent certifications or trainings you have pursued to enhance your knowledge.

Join Rise to see the full answer
Can you explain your understanding of the TCP/IP model and its relevance to network exploitation?

Provide a comprehensive yet clear explanation of the TCP/IP model, focusing on its layers. Share examples of how this understanding aids in network exploitation and troubleshooting, particularly in your prior work.

Join Rise to see the full answer
How would you approach creating a unique access solution for a client?

Outline your approach: understanding the client's needs, assessing existing systems, and designing a tailored solution. Highlight your analytical skills and creative problem-solving process, citing past experiences where similar solutions were developed.

Join Rise to see the full answer
What tools do you consider essential for your role as a Digital Network Exploitation Analyst 3?

Discuss key tools relevant to the role, such as PKTSWING, XKS, and RENOIR. Explain why you believe each tool is crucial for your analysis work and how you have effectively used them to derive insights in the past.

Join Rise to see the full answer
How do you ensure compliance with government security standards in your analyses?

Discuss your familiarity with relevant government security standards and your process for ensuring compliance. Emphasize your attention to detail and the steps you take to ensure that all analyses meet rigorous security requirements.

Join Rise to see the full answer
Similar Jobs
Posted 14 days ago
Wyetech Hybrid Annapolis Junction, Maryland
Posted 14 days ago
Posted 13 hours ago
Photo of the Rise User
Posted 9 days ago
Edify Software Consulting Remote Montecillos, Alajuela Province, Alajuela, Costa Rica
Posted 9 days ago
Photo of the Rise User
Leidos Hybrid Joint Base Pearl Harbor-Hickam, Hawaii
Posted 3 days ago
Photo of the Rise User
Inclusive & Diverse
Rise from Within
Mission Driven
Diversity of Opinions
Work/Life Harmony
Transparent & Candid
Growth & Learning
Fast-Paced
Collaboration over Competition
Take Risks
Friends Outside of Work
Passion for Exploration
Customer-Centric
Reward & Recognition
Feedback Forward
Rapid Growth
Medical Insurance
Paid Time-Off
Maternity Leave
Mental Health Resources
Equity
Paternity Leave
Fully Distributed
Flex-Friendly
Some Meals Provided
Snacks
Social Gatherings
Pet Friendly
Company Retreats
Dental Insurance
Life insurance
Health Savings Account (HSA)
Photo of the Rise User
Kate Farms Remote No location specified
Posted 10 days ago
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
December 20, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!