DNEA - DivIHN Integration Inc
Annapolis Junction, MD
About the Job
For further inquiries regarding the following opportunity, please contact one of our Talent Specialists:
Dipankar at 224 507 1264
Abdul at 224 507 1295
Amit at 224 507 1290
Dipankar at 224 507 1264
Abdul at 224 507 1295
Amit at 224 507 1290
Title: TS/SCI CI Poly Digital Network Exploitation Analyst (DNEA)
Location: Annapolis Junction, MD
Location: Annapolis Junction, MD
Job Description :
- The Digital Network Exploitation Analyst (DNEA) Malware or Network Threat Analyst will be part of a team responsible for analyzing, mapping, protecting and/or discovering vulnerabilities, intrusions and threats in computer network systems.
- The DNEA will conduct comprehensive analysis of all types of computer systems, networks and/or code, to discover unknown, suspicious or exploitation activity.
- They will collaborate with analytical counterparts and across the U.S. Intelligence Community and apply knowledge of network fundamentals, open-source tools, and current implementation of those technologies in order to devise strategies to pursue access and exploitation of targets of interest.
- We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters.
- Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances.
Required Skills & Experience.
PRIMARY RESPONSIBILITIES:
- Bachelors Degree and 5+ years of Network Analysis, DNEA, or Network Mapping experience.
* Perform long-term and time sensitive, in-depth technical analysis of malicious code (malware), analyze the inner workings, and develop defensive countermeasures.
* Write incident response reports, investigating computer attacks, and extract data from electronic systems.
* Train team members on analysis, tools and reporting.
* Perform technical analysis against target systems and networks, characterize target network capabilities and vulnerabilities, and support development of new techniques to exploit targets.
* Perform analyses of cyber activities to identify entities of interest; their methods, motives, and capabilities; determine malicious behavior; and recognize emergent patterns and linkages to visualize the larger picture of cyber-based operations.
* Discover unknown, suspicious or exploitation activity, and provide briefings of intrusion set activity to partner organizations/agencies.
* Perform technical analysis for exploitation of an identified activity that is of an unknown or suspicious origin.
* Perform long-term and time sensitive, in-depth technical analysis of malicious code (malware), analyze the inner workings, and develop defensive countermeasures.
* Write incident response reports, investigating computer attacks, and extract data from electronic systems.
* Train team members on analysis, tools and reporting.
* Perform technical analysis against target systems and networks, characterize target network capabilities and vulnerabilities, and support development of new techniques to exploit targets.
* Perform analyses of cyber activities to identify entities of interest; their methods, motives, and capabilities; determine malicious behavior; and recognize emergent patterns and linkages to visualize the larger picture of cyber-based operations.
* Discover unknown, suspicious or exploitation activity, and provide briefings of intrusion set activity to partner organizations/agencies.
* Perform technical analysis for exploitation of an identified activity that is of an unknown or suspicious origin.
BASIC QUALIFICATIONS:
* THIS POSITION REQUIRES AN ACTIVE TOP SECRET/SCI WITH POLYGRAPH CLEARANCE.
* Technical Bachelors Degree and a minimum of 3 years (or Associates Degree and 5 years experience) of work experience supporting Intel network and vulnerability analysis.
* In lieu Degree's 8 years of continuous work experience with Intel network and vulnerability analysis will be considered on a case by case basis.
* 5 or more years of Intelligence Community experience in network and vulnerability analysis.
* Experience with any of the following Malware tools: Wireshark, OllyDBg, IDA Pro, RegShot, TCPDump, WinHex, Windbg, or PEid. We would also consider Data Explorer, UTT, XKeyscore, or similar.
* Experience related to the use of relevant CNO and SIGINT tools and databases used for the customer mission.
About us:
DivIHN, the 'IT Asset Performance Services' organization, provides Professional Consulting, Custom Projects, and Professional Resource Augmentation services to clients in the Mid-West and beyond. The strategic characteristics of the organization are Standardization, Specialization, and Collaboration.
DivIHN is an equal opportunity employer. DivIHN does not and shall not discriminate against any employee or qualified applicant on the basis of race, color, religion (creed), gender, gender expression, age, national origin (ancestry), disability, marital status, sexual orientation, or military status.
Source : DivIHN Integration Inc