What are the responsibilities and job description for the Exploitation Analyst II (EA2) position at Combat Bound LLC?
Exploitation Analyst II (EA2)
Salary Range: Negotiable
Security Requirements: TS/SCI/FS Poly
Location: Ft. Meade, MD
Job Description:
As an Exploitation Analyst, you will evaluate target opportunities and strategize activities against particular networks using all source data to understand and map target networks and assist in developing detailed exploitation and operations plans.
Knowledge, Skills and Abilities (KSAs):
- Have the ability to analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.
- Understand how to develop innovative tradecraft needed to perform this analysis as technologies evolve.
- Know how to work as a part of a team, together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.
- Apply your inner curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights.
- Extract, document, contextualize and share your findings (including any new tradecraft developed) with teammates, stakeholders, and intelligence consumers.
Qualifications:
- Active TS/SCI Clearance and Full Scope Polygraph
- 5 Years experience with bachelor's degree, or a master's degree plus 3 years of relevant experience, or a Doctoral degree and 2 years of relevant experience.
- Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major
- Relevant Experience: Relevant experience must be in computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
- Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) may be considered towards the relevant experience requirement (i.e., 24-week JCAC course may count as 6 months of experience).
Key Words: Networks; Exploitation; Information Systems; Analysis; Operations
Company Description:
AIT is a leading provider of cyber and engineering solutions for government and commercial clients worldwide. Recognized as a progressive company in cybersecurity, engineering, and intelligence we understand the unique challenges our customers face in the constantly changing world of technology. Our unique worldwide partnerships build and expand our superior cybersecurity capabilities to ensure your mission will always succeed - even in a cyber contested environment.
From AIT's humble beginnings in 2001, our vision is to provide every customer with superior cyber, engineering, and intelligence solutions to ensure complete mission success. Our seasoned subject matter experts are innovative solutions professionals in cybersecurity for both traditional IT systems and operational technology (OT) in critical infrastructures. Each member of the AIT team holds firm to the idea that integrity, commitment, service, and excellence are essential to surpassing customer expectations and building relationships that last.
We are firmly committed to creating an inclusive environment for all employees. We are an Equal Opportunity/Affirmative Action Employer. All applicants for employment shall be given fair treatment regardless of their race, color, religion, age, sex (including gender identity, sexual orientation and pregnancy), national origin, disability, reprisal, marital status, parental status, genetic information, political affiliation, veteran's status or other any other prohibited factors.