RealmOne-posted about 2 months ago
Full-time • Mid Level
Wahiawa, HI
501-1,000 employees

We are looking for a Digital Network Exploitation Analyst to evaluate target opportunities through comprehensive analysis of all-source data. The role involves mapping target networks and assisting in the development of detailed exploitation and operational plans. Responsibilities include analyzing SIGINT and cybersecurity data across various OSI network layers, understanding IP core infrastructure, communication devices, network connectivity, and traffic patterns. The analyst will need to develop new techniques as technology evolves. Collaboration is key, working with government, military, and contractor personnel to align on intelligence needs and mission relevance. The ideal candidate will use their curiosity and analytical skills to form hypotheses, select analysis methods, and integrate, evaluate, and interpret data to uncover insights. Findings and newly developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Level 3 Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or network and systems administration.

  • Evaluate target opportunities through comprehensive analysis of all-source data
  • Map target networks
  • Assist in the development of detailed exploitation and operational plans
  • Analyze SIGINT and cybersecurity data across various OSI network layers
  • Understand IP core infrastructure, communication devices, network connectivity, and traffic patterns
  • Develop new techniques as technology evolves
  • Collaborate with government, military, and contractor personnel to align on intelligence needs and mission relevance
  • Form hypotheses, select analysis methods, and integrate, evaluate, and interpret data to uncover insights
  • Document and share findings and newly developed techniques with teammates, stakeholders, and intelligence consumers
  • Experience in computer or information systems design, development, or analysis.
  • Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or network and systems administration.
  • An Associate’s Degree with 10 years of experience
  • A Bachelor’s Degree with 8 years of experience
  • A Master’s Degree with 6 years or experience
  • A PhD with 4 years of experience
  • A Degree in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics)
  • Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major
  • Completion of military training in a relevant area such as the Joint Cyber Analysis Course (JCAC) may count towards the experience requirement (24-week JCAC course may count as 6 months of experience)
  • Degree must be in Computer Science, Computer Engineering, Electrical Engineering, Mathematics, or a related field with at least one programming and at least 4 upper-level math classes (Calculus and above).
  • Relevant experience must be in a computer science area (i.e. theoretical or applied), simulation/model development, designing/developing/using/evaluating mathematic models, methods, and/or techniques (e.g. algorithm or development) computation science, algorithm analysis and design, reverse engineering, and/or designing/developing computer and information systems, including engineering hardware and/or software.
  • Position requires active Security Clearance with appropriate Polygraph
  • Exceptional benefits
  • Flexible schedules
  • Paid training
  • Mentoring
  • Opportunity to work alongside top-notch industry professionals
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service