About The Position

Markon is seeking a Defense Network Exploitation Analyst to support their Fort Meade Customer. Markon is a premier consulting firm deeply dedicated to advancing our nation's most critical missions. At Markon, they offer opportunities for personal and professional transformation, empowering employees to lead, innovate, and excel, fostering an environment where new ideas are welcomed and celebrated. As a perennial Washington Post Top Workplace, Markon prioritizes the well-being and success of its team members. Headquartered in Falls Church, Virginia, Markon has garnered national recognition for its unwavering dedication to excellence in serving the intelligence community, as well as federal civilian and defense agencies. Their growing reach extends across 17 states, 116 countries, and 5 continents, where their team of dynamic professionals collaborates to deliver unparalleled program and project management services. Markon values people and the tremendous impact each individual can make, consistently recognized as one of the best places to work in federal government consulting. Employees can help solve the nation’s most important challenges, surrounded by colleagues who help them grow, advance, and succeed, dedicated to bringing out the best in each other to advance clients’ missions.

Requirements

  • TS/SCI with Active Polygraph
  • Digital network analysis, characterization, or exploitation analysis
  • Must be able to demonstrate knowledge and understanding of communication networks and security issues such as vulnerabilities and common hacker TTPs
  • Computer networking and telecommunication architecture, the OSI model, communication protocols, TCP/IP, IPv6, routing concepts, network mapping, sub-netting and target templating
  • Public Switching Telephone Network Infrastructure
  • Mobile technologies and geospatial analysis
  • Knowledgeable in advanced analytic techniques
  • Basic understanding of cloud architecture and data flow
  • Familiarity with vulnerabilities and malware
  • Bachelor’s degree and 2-11 years of relevant experience, a Master’s degree plus 3-9 years of relevant experience or a Doctoral degree and 2-7 years of relevant experience. An Associate’s degree plus 4-13 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.
  • Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering and/or network and system administration.
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course) will be considered towards the relevant experience requirement (i..e., 24-week JCAC course will count as 6 months of experience).

Nice To Haves

  • Desire for continual learning and strong problem-solving, analytic and interpersonal skills that are: flexible - able to communicate effectively, able to collaborate with others
  • Knowledge of network protocols (especially TCP/IP, VOIP, wireless protocols)
  • Understanding of Internet
  • Understanding of WAN and LAN
  • Vulnerability analysis
  • Programming experience (prefer one or more of the following: C, C++, Java, Assembly, Python)

Responsibilities

  • Have the ability to perform technical analysis of metadata and content for systems and networks of interest across several communications technologies and protocols
  • Characterize target network capabilities and vulnerabilities using advanced application analysis
  • Support development of new techniques to exploit targets
  • Use current IC tools and databases to research relevant intelligence sources

Benefits

  • Medical
  • Dental
  • Vision
  • Life Insurance
  • Short-Term Disability
  • Long-Term Disability
  • 401(k) match
  • Flexible Spending Accounts
  • EAP
  • Training and Tuition Assistance
  • Paid Time Off
  • Holidays
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service