Exploitation Analyst SME with Security Clearance

3 weeks ago


Fort Meade, United States Markesman Group Full time

Title Exploitation Analyst SME Location Fort Meade Description Markesman Group is looking for an Exploitation Analyst SME to join our team in San Antonio, Texas. The Exploitation Analyst SME collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. They leverage all authorized resources and analytic techniques to penetrate targeted networks. Responsibilities: * Knowledge of computer networking concepts and protocols, and network security methodologies. * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). * Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. * Knowledge of cybersecurity and privacy principles. * Knowledge of cyber threats and vulnerabilities. * Knowledge of specific operational impacts of cybersecurity lapses. * Knowledge of application vulnerabilities. * Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless). * Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). * Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies. * Knowledge of collection management processes, capabilities, and limitations. * Knowledge of front-end collection systems, including traffic collection, filtering, and selection. * Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). * Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. * Knowledge of website types, administration, functions, and content management system (CMS). * Knowledge of applicable statutes, laws, regulations and policies governing cyber targeting and exploitation. * Knowledge of relevant reporting and dissemination procedures. * Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). * Knowledge of implants that enable cyber collection and/or preparation activities. * Knowledge of principles of the collection development processes (e.g., Dialed Number Recognition, Social Network Analysis). * Knowledge of internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc. * Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc. * Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies. * Knowledge of common networking devices and their configurations. * Knowledge of common reporting databases and tools. * Knowledge of concepts for operating systems (e.g., Linux, Unix.) * Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). * Knowledge of data flow process for terminal or environment collection. * Knowledge of evasion strategies and techniques. * Knowledge of how hubs, switches, routers work together in the design of a network. * Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP). * Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http). * Knowledge of identification and reporting processes. * Knowledge of Internet and routing protocols. * Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). * Knowledge of intrusion sets. * Knowledge of midpoint collection (process, objectives, organization, targets, etc.). * Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). * Knowledge of network topology. * Knowledge of organizational and partner authorities, responsibilities, and contributions to achieving objectives. * Knowledge of organizational and partner policies, tools, capabilities, and procedures. * Knowledge of products and nomenclature of major vendors (e.g., security suites - Trend Micro, Symantec, McAfee, Outpost, and Panda) and how those products affect exploitation and reduce vulnerabilities. * Knowledge of scripting * Knowledge of strategies and tools for target research. * Knowledge of target intelligence gathering and operational preparation techniques and life cycles. * Knowledge of terminal or environmental collection (process, objectives, organization, targets, etc.). * Knowledge of the basic structure, architecture, and design of converged applications. * Knowledge of the basic structure, architecture, and design of modern communication networks. * Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications).Qualifications: * Demonstrated abilities, knowledge, and skills as defined by AN-EXP-001 within the NICE Cybersecurity Framework. * Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. * Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. * Ability to collaborate effectively with others. * Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. * Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products. * Ability to expand network access by conducting target analysis and collection to identify targets of interest. * Ability to identify/describe target vulnerability. * Ability to identify/describe techniques/methods for conducting technical exploitation of the target. * Ability to select the appropriate implant to achieve operational goals. * Must possess a TS/SCI clearance. About the Organization About Markesman Group Markesman Group has gathered the nation's foremost experts in Cyber, ISR, Enterprise IT and Intelligence Analysis. We seek to lead with cutting edge technology, high quality development and best value services for both the government and commercial sectors. Our team combines passion, acumen, focus, patriotism, desire, dedication and the love for the job to create value for our customers. We pride ourselves in a rigorous selection process because not only do we want the best, we want the best to want us. Working closely together as part of a service-disabled veteran owned small business, we enjoy a family environment where teammates challenge and elevate each other every day. The Markesman family is always striving to solve tomorrow's problems, today. EOE Statement We are an Equal Opportunity/Affirmative Action Employer. We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state, or local law. This position is currently accepting applications.



  • Fort Meade, United States Arsiem Corporation Full time

    ARSIEM is looking for an Exploitation Analyst. This position will support one of our government clients. Most of the openings will be in Ft. Meade, MD, Ft. Gordon, GA and Wahiawa, Oahu, HI. Minimum Qualifications: Associate’s degree and 10 years of relevant experience; Bachelor’s degree and 8 years of relevant experience; Master’s degree and 6 years of...


  • Fort Meade, United States Markesman Group Full time

    Title Threat Analyst SME Location Fort Meade Description Markesman Group is looking for a Threat Analyst SME to join our team in San Antonio, Texas. The Threat Analyst SME develops cyber indicators to maintain awareness of the status of the highly dynamic operating environment. They collect, processes, analyze, and disseminate cyber threat/warning...


  • Fort Meade, United States JY Systems LLC Full time

    Description The Exploitation Analyst will collaborate to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks. The Exploitation Analyst will: Assess data for new or continued opportunities. Communicate complex...

  • Exploitation Analyst

    3 weeks ago


    Fort Meade, United States Peraton Full time

    About Peraton Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our...


  • Fort Meade, United States SilverEdge Full time

    Overview As a Mobile Computer Network Exploitation Analyst within Foundational Services, you will combine analytic and technical expertise to facilitate the exploitation of digital networks. You'll work closely with the customer, operators, users, analysts, software engineers, and other technical experts to identify and develop solutions to automate and...


  • Fort George G Meade, United States Jacobs Technology, Inc. Full time

    JACOBS is seeking Exploitation Analysts (EAs) for a variety of roles to support core Intelligence Community (IC) missions through our Next Generation Analysts portfolio. Our national security depends on technology as never before, and this dependence is growing at an ever-increasing rate. As a cyber professional in the intelligence community, you will work...


  • Fort Liberty, United States Cherokee Federal Full time

    Intelligence Targeting Analyst SME ***This position requires an active TS/SCI clearance*** Cherokee Preting is seeking an Intelligence Targeting Analyst SME to support and engage in the target development process in deployed environments in support of Intelligence collection, CT, and counter proliferation. The Intelligence Targeting Analyst SME will identify...


  • Ft Meade, United States Acclaim Technical Services Full time

    Acclaim Technical Services, founded in 2000, is a leading language, operations, and technology services company supporting a wide range of U.S. Federal agencies. We are an Employee Stock Ownership Plan (ESOP) company, which is uncommon within our business sector. We see this as a significant strength, and it shows: ATS is consistently ranked as a top...

  • Exploitation Analyst

    3 weeks ago


    Fort Meade, United States Peraton Full time

    About Peraton Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our...


  • Fort Meade, MD, United States Jacobs Technology, Inc. Full time

    JACOBS is seeking Exploitation Analysts (EAs) for a variety of roles to support core Intelligence Community (IC) missions through our Next Generation Analysts portfolioOur national security depends on technology as never before, and this dependence is growing at an ever-increasing rateAs a cyber professional in the intelligence community, you will work as...


  • Fort Gordon, United States MultiLingual Solutions Inc. Full time

    MultiLingual Solutions, Inc. (MLS) is a comprehensive foreign language services firm that provides full- spectrum linguistic, analytical and operational support to U.S. Government and private sector customers. MLS provides services in over 100 languages and resources in more than 60 countries. MLS specializes in mobilizing the linguistic, technical and...


  • Meade, United States National Security Agency (NSA) Full time

    ResponsibilitiesThe need to maintain our core Computer Science group is vital to provide the technical capabilities necessary to successfully execute NSA's mission. The increased complexity of supporting NSA's mission requires world class researchers, programmers, and developers who operate in teams in areas such as software engineering, information...


  • Fort Meade, United States Farfield Systems, Inc Full time

    About Farfield Systems, Inc. At Farfield we are committed to delivering trusted expertise to our government clients. As we grow, our focus is on increasing opportunities for you to grow with us while still delivering the same excellence customers have grown to expect from us. We continually evaluate our environment to provide a place where your career is...

  • Exploitation Analyst

    4 weeks ago


    Meade, United States National Security Agency (NSA) Full time

    ResponsibilitiesNSA stays at the forefront of Cybersecurity. Backed by a talented cadre of capabilities development specialists, NSA operates innovative solutions to gather foreign Intelligence via Computer Network Exploitation. Analysts will receive expert and specialized training on state of the art tools and capabilities. A full career track that covers...

  • Exploitation Analyst

    3 weeks ago


    Fort Meade, United States Peraton Full time

    About Peraton Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our...


  • Fort Meade, United States Peraton Full time

    About Peraton Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our...


  • Fort Meade, United States Strategic Resilience Group Full time

    SRG is seeking an experienced Intelligence Analyst to join our team of Cyber Operation Analysts and Subject Matter Experts (SMEs) to support planning, coordination, synchronization, and execution of offensive cyberspace operations in support of aligned combatant command and designated sub-unified commands. This includes a deep understanding and experience in...


  • Fort Meade, United States SilverEdge Full time

    Overview The Exploitation Analyst (EA) shall identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. The EA will leverage all authorized resources and analytic techniques to penetrate target networks. The EA shall create comprehensive strategies to develop and maintain access, conduct remote...


  • Fort Meade, United States Arsiem Corporation Full time

    ARSIEM is looking for a Digital Network Exploitation Analyst. This position will support one of our Government clients. Most of the openings will be in Ft. Meade, MD, and Wahiawa, Oahu, HI. Minimum Qualifications: Associate’s degree and 7 years of relevant experience; or Bachelor’s degree and 5 years of relevant experience; or Master’s degree and 3...


  • Fort Meade, United States SilverEdge Full time

    Overview The Exploitation Analyst (EA) shall identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. The EA will leverage all authorized resources and analytic techniques to penetrate target networks. The EA shall create comprehensive strategies to develop and maintain access, conduct remote...