What are the responsibilities and job description for the Exploitation Analyst position at Waypoint Human Capital?
Position Title: Exploitation Analyst
Position Type: On-Site
Location: Chantilly, VA
Clearance Required: Secret
Waypoint’s customer is seeking an Exploitation Analyst to support critical intelligence operations by analyzing and addressing cyber threats to U.S. national security. Responsible for applying advanced technical and analytical skills to support cyber threat intelligence integration, collection, and dissemination activities.
Requirements:
• A minimum of three years of intelligence analysis work experience in the USIC, all of which
supported offices whose primary focus was cyber threats to U.S. national security
• Any of the following certifications: CEH, CHFI, CFR, CySA , Cloud , PenTest , Security , Network , GCIA, GCIH, GICSP, or SCYBER.
• In-depth knowledge of system administration concepts across Unix/Linux, IOS, Android, and Windows.
• Understanding of operating system structures, including process management and directory structures.
• Familiarity with networking devices, configurations, and network topology, including hubs, switches, and routers.
• Proficiency in identifying application vulnerabilities and exploiting target weaknesses.
• Understanding of network security principles, including encryption, firewalls, and perimeter protection.
• Familiarity with intrusion sets, evasion strategies, and techniques.
• Ability to collect, analyze, and interpret metadata (e.g., email, HTTP traffic).
• Knowledge of collection techniques for VOIP, Media Over IP, VPN, webmail, cookies, and emerging technologies.
• Expertise in reporting and dissemination procedures for intelligence data.
• Knowledge of scripting and programming for automation and analysis.
• Familiarity with major security tools (e.g., Trend Micro, Symantec, McAfee).
• Understanding of data flow processes, terminal collection, and environmental collection.
• Proficiency in target intelligence gathering and operational preparation techniques.
• Skilled in using strategies and tools for identifying vulnerabilities and conducting in-depth target research.
• Understanding of internal and external customer needs, partner organizations, and reporting objectives.
• Ability to interpret and report intelligence findings effectively
Desired Skills:
• Skilled in analyzing network traffic to identify devices and detect malicious activity.
• Proficient in interpreting the impact of router and firewall configurations on LAN/WAN traffic and performance.
• Expertise in using trace route tools and interpreting results for network analysis and reconstruction.
• Ability to create and extract vital information from packet captures.
• Proficient in data fusion from existing intelligence to enable new and continued collection.
• Skilled in using databases to identify target-relevant information.
• Expertise in geospatial techniques for locating, identifying, and tracking targets.
• Proficiency in interpreting metadata and content as applied by collection systems.
• Skilled in creating collection requirements to support data acquisition activities.
• Proficient in writing and submitting requirements to address technical capability gaps.
• Ability to recognize technical information such as credentials, email addresses, and IP ranges for exploitation.
• Skilled in interpreting compiled and interpretive programming languages.
• Proficiency in researching vulnerabilities and exploits present in traffic.
• Expertise in navigating network visualization software for analysis.
• Skilled in using non-attributable networks for secure operations.
• Ability to collaborate effectively with others to conduct target analysis, identify vulnerabilities, describe techniques for technical exploitation, and select appropriate implants to achieve operational goals.
Education Requirements:
• Bachelor’s degree (any major) 2 years of USIC intelligence analysis experience or
• Bachelor’s in computer science, engineering, mathematics, or information systems 2 years of USIC intelligence analysis experience or
• 3 years of USIC intelligence analysis focused on cyber threats.