Digital Network Exploitation Analyst (DNEA)
Tiffany -Jehl
- Fort George G Meade, MD
Digital Network Exploitation Analyst (DNEA)
Location: Fort Mead, MD
FUNCTIONAL RESPONSIBILITY:
The selected candidate will:
- Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans.
- Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.
- Develop new tradecraft needed to perform analysis as technologies evolve.
- Apply curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
- Distill, document, contextualize and share findings--including any new tradecraft--with teammates, stakeholders, and intelligence consumers
- Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.
SKILLSET:
Demonstrated experience/knowledge in one or more of the following areas:
- Digital network analysis, characterization, or exploitation.
- Intelligence collection capabilities and limitations, to include but not limited to technical sensors / platforms and human intelligence sources, SIGINT development (SIGDEV) or computer network provider capabilities and workflows, and technical metadata or content analysis
- Software applications and databases associated with network analysis and target development
- Computer networking and telecommunication architecture, the OSI model, communication protocols, and common hacker TTPs
- TCP/IP, IPv6, routing concepts, network mapping, subnetting, and target templating
- Understanding policies that govern all facets of cyberspace operations and advise leaders on how to posture analytic resources against mission requirements.
Desired experience/knowledge in one or more of the following areas:
- Certifications such as SANS GCTI, GNFA, GCIH, GXPN, GCIA, GREM, or GDAT; Offensive Security OSCP, OSWE, OSCE, OSEE; Cisco CyberOps, CCNA, CCNP; CompTIA CySA+, CASP, Security+, Network+; EC-Council CEH
- Graduate of the Joint Cyber Analysis Course (JCAC)
- Prior experience supporting Cyber Mission Force requirements
EDUCATION REQUIREMENTS:
Degree in one of the following degrees:
- Computer Science • Information Technology (IT) or Information Security (IS) (relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major)
- (Electronic Engineering, Electrical Engineering, Physics, or Mathematics (relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics)
RELEVANT EXPERIENCE:
- Computer or information systems design/development/analysis roles
- Engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
- Graduate of the Joint Cyber Analysis Course (JCAC)
SECURITY REQUIREMENTS:
- Active Top Secret clearance with SCI eligibility and Polygraph
Salary: 100-250k
Posted On: Friday, April 12, 2024