Digital Network Exploitation Analyst (DNEA)

STAG Industrial, Inc.San Antonio, TX

About The Position

Strategic Technologies Analytics Group (STAG) is seeking a Digital Network Exploitation Analyst to support a Department of Defense (DOD) customer. You will collaborate with analytical counterparts across the Intelligence and Operational Communities of Interest to develop access and exploitation analytical strategies against targets of interest. Our ideal candidate will leverage their extensive cyberspace experience to conduct Target Systems Analysis, System of Systems Analysis, Vulnerability Analysis, and Critical Factor Analysis against systems of interest. Applying knowledge gained, you will develop tailored solutions for Access / Exploitation methodologies incorporating weaponeering analysis as well as intelligence and cyberspace capability limitations required to execute operations. As a subject matter expert, you will work with a team to deliver analytical products (orally, visually, and in written formats) in accordance with established DOD policies, procedures, and requirements. In this role, you will analyze highly complex and diverse mission areas requiring innovative solutions using computer science and engineering practices. Additionally, you will conduct the following duties:

Requirements

  • TS/SCI clearance with Polygraph or be willing to pass a polygraph as required.
  • BS or BA degree in Technical, Engineering, or Computer Science related field with at least 4 years of relevant experience or at least 8 years of relevant technical experience in lieu of a degree.
  • Demonstrated advanced knowledge of internet protocols, telecommunication technologies, and internet routing principles.
  • Proven mastery in offensive cyber operations (OCO) environments.
  • Demonstrated advanced knowledge of software applications, operating systems, and databases within telecommunications architecture.

Nice To Haves

  • Excellent written and verbal communication skills with the ability to present complex technology in layman's terms.
  • Self- motivated, creative, willing to work as a member of a team, and can organize and manage individual schedule.
  • Experience in programming and machine language to read, interpret, write, modify, and execute simple scripts on Windows, Unix, and/or mobile operating systems.
  • Knowledge in reverse engineering concepts (e.g. hex editing, binary packaging utilities, debugging, and strings analysis) to identify function and ownership of remote tools.
  • Successful completion of any of the following courses or certifications: Certified Ethical Hacking Certification, Certified Cyber Fires Planner, Cisco Certified Network Associate Certification, 39th IOS Cyber Warfare Operations Course, Joint Network Attack Course (JNAC), Joint Cyber Analysis Course (JCAC), Joint Cyber Operations Planners Course (JCOPC), Advanced Cyber Warfare Courses (JACWC/PACWC/NSA E and A courses), EC-Council Licensed Penetration Tester (Master) Credential, GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), Certified Penetration Tester, Targeting Intelligence Formal Training Unit, Joint Targeting School, and/or Remote Interactive Operator Training.

Responsibilities

  • Execute target analysis and research to identify communication infrastructures supporting USCYBERCOM and DOD customer objectives.
  • Conduct operational research from various sources/metadata to identify, analyze, and characterize network (logically and physically), telecommunications, and social networks to build a comprehensive operational picture.
  • Conduct target research from various sources, identifying vulnerabilities, indicators and warnings, performing intelligence analysis through the application of analytic tools and techniques, providing government client with analysis of targeting options, and provide analytic tradecraft mentorship and training as needed.
  • Identify and prioritize vulnerabilities using various Critical Factor Analysis techniques.
  • Analyze data to identify new access development opportunities for follow-on collection requirements.
  • Develop tailored access and exploitation strategies against targets of interest.
  • Create weaponeering solutions with known capabilities (existing and/or developmental) to meet operational requirements.
  • Conduct SIGINT disciplines of collection, target development, and tasking.
  • Understand logical/physical IP core infrastructure, communication devices, and how they connect to networks, and the traffic movements in a network.
  • Conduct gaps and seams analysis to identify additional intelligence and/or capability requirements.
  • Leverage experience in computer or information systems design/development/analysis, engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
  • Identify, collect, analyze process and disseminate information in accordance with established requirements and priorities.
  • Deliver customized target/technical solutions via oral, visual, and written analytical products to support client cyberspace operational requirements.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service