Exploitation Analyst 3
Apply NowCompany: Inovex Information Systems
Location: Mc Lean, VA 22101
Description:
We're searching fortalented individuals who provide intelligence, engineering, and mission management expertise for the Government.This program will maximize the effectiveness and efficiency of our country's most important missions both at home and abroad. If you are ready to support a high-performing team that truly makes a difference, thencome join us!
Job Description:
We are seeking an Exploitation Analyst to leverage their expertise in adversary networks, network defenses, and cyber operational capabilities to craft and adjust exploitation strategies. This role involves close collaboration with government, military, and contractor teams to understand intelligence needs and mission priorities. As an analyst, you will utilize your analytical skills and curiosity to generate hypotheses, select appropriate analysis methods, and work with data to extract and share insights. You will also document, contextualize, and disseminate your findings, including any innovative techniques you develop, to team members, stakeholders, and intelligence consumers.
In this role, you will:
The Level 3 Exploitation Analyst shall possess the following capabilities:
Qualifications:
Position requires Active Security Clearance with appropriate Polygraph
Job Description:
We are seeking an Exploitation Analyst to leverage their expertise in adversary networks, network defenses, and cyber operational capabilities to craft and adjust exploitation strategies. This role involves close collaboration with government, military, and contractor teams to understand intelligence needs and mission priorities. As an analyst, you will utilize your analytical skills and curiosity to generate hypotheses, select appropriate analysis methods, and work with data to extract and share insights. You will also document, contextualize, and disseminate your findings, including any innovative techniques you develop, to team members, stakeholders, and intelligence consumers.
In this role, you will:
- Apply your deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed
- Apply your analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
- Distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
The Level 3 Exploitation Analyst shall possess the following capabilities:
- Proven experience in computer or information systems design, development, and analysis.
- Background in one or more of the following areas: engineering hardware/software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, network and systems administration.
- Military training such as the Joint Cyber Analysis Course (JCAC) can substitute for relevant experience (e.g., the 24-week JCAC course equates to 6 months of experience).
- Foreign language proficiency can be considered towards experience requirements; recent Interagency Language Roundtable (ILR) scores must be provided to validate proficiency level.
- Strong analytical skills with the ability to develop exploitation plans and adjust them during execution.
- Excellent teamwork and collaboration skills to work with government, military, and contractor personnel.
- Ability to distill, document, and share findings effectively, including developing new tradecraft techniques.
Qualifications:
- A degree plus years of experience as one of the following:
- An Associate's Degree with 10 years of experience
- 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree.
- A Bachelor's Degree with 8 years of experience
- A Master's Degree with 6 years of experience
- A PhD with 4 years of experience
- An Associate's Degree with 10 years of experience
- Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience/education requirement (i.e., 24-week JCAC course will count as 6 months of experience).
Position requires Active Security Clearance with appropriate Polygraph