Exploitation Analysts 1
Company | Amentum |
---|---|
Location | Odenton, MD, USA |
Salary | $Not Provided – $Not Provided |
Type | Full-Time |
Degrees | Bachelor’s |
Experience Level | Junior, Mid Level |
Requirements
- Must be a U.S citizen.
- Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.
- Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.). 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.
- Minimum 2 years of relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering for Analysts 1; 5 years for Analysts 2 and 3; 11 years for Analyst 4.
- Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered toward relevant experience requirement.
- Network+, Security+, Certified Ethical Hacker, Cisco Certified Network Associate or similar certifications preferred.
Responsibilities
- Primary mission is exploitation. Create exploitation plans and make operational adjustments using understanding of network defenses and vulnerabilities.
- Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems.
- Develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security.
- Work with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.
- Apply analytical thinking to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights.
- Distill, document, contextualize and share your findings with teammates, stakeholders, and intelligence consumers.
- Utilize network or system administration.
Preferred Qualifications
- Network+, Security+, Certified Ethical Hacker, Cisco Certified Network Associate or similar certifications preferred.