You haven't searched anything yet.
Location: Ability to perform in various geographic locations or onsite as needed
Job Category: Information Technology
Time Type: Full time
Minimum Clearance Required to Start: TS/SCI clearance required
Employee Type: W2 or 1099
Citizenship: US Citizen (non-dual citizenship)
NexThreat is looking for an Exploitation Analyst who will collaborate to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverage all authorized resources and analytic techniques to penetrate targeted networks.
Specific responsibilities:
• Conduct and/or support authorized penetration testing on enterprise network assets.
• Communicate complex information concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
• Create comprehensive strategies to develop and maintain accesses, conduct remote exploitation, and provide technical assistance.
• Analyze intelligence information, technical data, and exploitation opportunities.
• Evaluate, analyze, and synthesize large quantities of data into high-quality, fused targeting/intelligence products.
Qualifications:
• Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance and/or systems engineering, additionally, must have experience in network or system administration.
• Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, webmail and cookies. Knowledge of concepts for operating systems (e.g., Linux, Unix.).
• Knowledge of products and nomenclature of major vendors (e.g., security suites - Trend Micro, Symantec, McAfee, Outpost, and Panda) and how those products affect exploitation and reduce vulnerabilities.
• Skill in recognizing technical information that may be used for leads to enable remote operations (data includes users, passwords, email addresses, IP ranges of the target, frequency in DNI behavior, mail servers, domain servers, SMTP header information).
Education:
• A bachelor’s degree plus 11 years of relevant experience, or a master’s degree plus 9 years of relevant experience, or a Doctoral degree and 7 years of relevant experience. The following may also be considered for individuals with in-depth experience that is clearly related to the position: an associate degree plus 13 years of relevant experience.
• Degree must be in Network Engineering, Systems Engineering, Information Technology or a related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
Desired Qualifications:
• CEH Certified Ethical Hacker
• CFR CyberSec First Responder
• CySA CompTIA Cybersecurity Analyst
• GCFA GIAC Certified Forensics Analysis
• GCIH GIAC Certified Incident Handle
• SCYBER Cisco Cybersecurity Specialty Certification
• CNDSP Computer Network Defense Service Provider
• CSSP-IR DoD Cyber Security Service Provider for Incident Responder
Clearance Requirements: TS/SCI clearance is required.
\n\n
Other
$96k-124k (estimate)
11/06/2023
03/27/2024