Posted in

Exploitation Analysts 1

Exploitation Analysts 1

CompanyAmentum
LocationOdenton, MD, USA
Salary$Not Provided – $Not Provided
TypeFull-Time
DegreesBachelor’s
Experience LevelJunior, Mid Level

Requirements

  • Must be a U.S citizen.
  • Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.
  • Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.). 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.
  • Minimum 2 years of relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering for Analysts 1; 5 years for Analysts 2 and 3; 11 years for Analyst 4.
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered toward relevant experience requirement.
  • Network+, Security+, Certified Ethical Hacker, Cisco Certified Network Associate or similar certifications preferred.

Responsibilities

  • Primary mission is exploitation. Create exploitation plans and make operational adjustments using understanding of network defenses and vulnerabilities.
  • Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems.
  • Develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security.
  • Work with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.
  • Apply analytical thinking to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights.
  • Distill, document, contextualize and share your findings with teammates, stakeholders, and intelligence consumers.
  • Utilize network or system administration.

Preferred Qualifications

  • Network+, Security+, Certified Ethical Hacker, Cisco Certified Network Associate or similar certifications preferred.