Digital Network Exploitation Analyst Level 3
ELEVI Associates
·
Posted:
April 20, 2023
·
Other
About the position
The Digital Network Exploitation Analyst will evaluate target opportunities using all source data to understand and map target networks, analyze SIGINT and cybersecurity data, and develop new tradecraft needed to perform this analysis as technologies evolve. They will work together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise. The ideal candidate will have a degree in Computer Science or related fields, and 4-10 years of applicable experience. An active clearance with Poly is required.
Responsibilities
- Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans.
- Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.
- Be involved in developing new tradecraft needed to perform this analysis as technologies evolve.
- Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.
- Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights.
- Distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers.
Requirements
- Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans.
- Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.
- Be involved in developing new tradecraft needed to perform this analysis as technologies evolve.
- Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.
- Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights.
- Distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers.
- Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major.
- 4 years’ applicable experience with a PhD, OR 6 years’ applicable experience with a master’s degree, OR 8 years’ applicable experience with a bachelor’s degree, OR 10 years’ applicable experience with an associate degree.
- Relevant experience must be in computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) may be considered towards the relevant experience requirement (i.e., 24-week JCAC course may count as 6 months of experience).
- Active Clearance with Poly.