Your Impact :
We are seeking Digital Network Exploitation Analysts (DNEA) for a variety of roles to support core Intelligence Community (IC) missions.
As a cyber professional in the intelligence community, you will work as part of a team on the frontlines against our cyber adversaries.
Responsibilities :
- Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans.
- Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical / physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.
- Involved in developing new tradecraft needed to perform this analysis as technologies evolve.
- Work together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.
- Form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
- Distill, document, contextualize and share your findings including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers.
divergent
Here’s what you’ll need :
- Relevant experience must be in computer or information systems design / development / analysis.
- In addition, it may also include engineering hardware and / or software, programming, computer / network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and / or network and systems administration.
- Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience / education requirement (i.
e., 24-week JCAC course will count as 6 months of experience).
In some cases, foreign language proficiency may also be used to satisfy experience requirements; recent Interagency Language Roundtable (ILR) scores are required to substantiate your proficiency level.
Clearance Required :
TS / SCI w / Poly
Minimum Education :
- Technical Degree (additional experience, military training, or certifications can be substituted for degree)
- Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas : algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics).
- Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major.
Minimum Years of Experience :
- 10yrs with and Associates Degree
- 8yrs with a Bachelor’s degree
- 6yrs with a Master’s degree
- 4yrs with a Doctorate degree
Preferred :
- Current on latest cyber threat tools, adversarial tactics and TTPs. and threats. Evaluate multiple operating systems for operational vulnerabilities.
- Background in cyber offensive and defensive cyber methodologies. AMOD experience, must have used agency specific TTPS and tools OR
Financial Data Analysis experience OR
Pkswing, Protocol analysis, wireshark, XKS / fingerprints