Exploitation Analyst SME with Security Clearance

4 weeks ago


Fort Meade MD United States Markesman Group Full time
Title Exploitation Analyst SME Location Fort Meade Description Markesman Group is looking for an Exploitation Analyst SME to join our team in San Antonio, Texas
The Exploitation Analyst SME collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities
They leverage all authorized resources and analytic techniques to penetrate targeted networks
Responsibilities:
• Knowledge of computer networking concepts and protocols, and network security methodologies.
• Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
• Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
• Knowledge of cybersecurity and privacy principles.
• Knowledge of cyber threats and vulnerabilities.
• Knowledge of specific operational impacts of cybersecurity lapses.
• Knowledge of application vulnerabilities.
• Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
• Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
• Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies.
• Knowledge of collection management processes, capabilities, and limitations.
• Knowledge of front-end collection systems, including traffic collection, filtering, and selection.
• Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
• Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems.
• Knowledge of website types, administration, functions, and content management system (CMS).
• Knowledge of applicable statutes, laws, regulations and policies governing cyber targeting and exploitation.
• Knowledge of relevant reporting and dissemination procedures.
• Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).
• Knowledge of implants that enable cyber collection and/or preparation activities.
• Knowledge of principles of the collection development processes (e.g., Dialed Number Recognition, Social Network Analysis).
• Knowledge of internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc.
• Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc.
• Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies.
• Knowledge of common networking devices and their configurations.
• Knowledge of common reporting databases and tools.
• Knowledge of concepts for operating systems (e.g., Linux, Unix.)
• Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).
• Knowledge of data flow process for terminal or environment collection.
• Knowledge of evasion strategies and techniques.
• Knowledge of how hubs, switches, routers work together in the design of a network.
• Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP).
• Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http).
• Knowledge of identification and reporting processes.
• Knowledge of Internet and routing protocols.
• Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).
• Knowledge of intrusion sets.
• Knowledge of midpoint collection (process, objectives, organization, targets, etc.).
• Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).
• Knowledge of network topology.
• Knowledge of organizational and partner authorities, responsibilities, and contributions to achieving objectives.
• Knowledge of organizational and partner policies, tools, capabilities, and procedures.
• Knowledge of products and nomenclature of major vendors (e.g., security suites - Trend Micro, Symantec, McAfee, Outpost, and Panda) and how those products affect exploitation and reduce vulnerabilities.
• Knowledge of scripting
• Knowledge of strategies and tools for target research.
• Knowledge of target intelligence gathering and operational preparation techniques and life cycles.
• Knowledge of terminal or environmental collection (process, objectives, organization, targets, etc.).
• Knowledge of the basic structure, architecture, and design of converged applications.
• Knowledge of the basic structure, architecture, and design of modern communication networks.
• Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications).Qualifications:
• Demonstrated abilities, knowledge, and skills as defined by AN-EXP-001 within the NICE Cybersecurity Framework.
• Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
• Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
• Ability to collaborate effectively with others.
• Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
• Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.
• Ability to expand network access by conducting target analysis and collection to identify targets of interest.
• Ability to identify/describe target vulnerability.
• Ability to identify/describe techniques/methods for conducting technical exploitation of the target.
• Ability to select the appropriate implant to achieve operational goals.
• Must possess a TS/SCI clearance
About the Organization About Markesman Group Markesman Group has gathered the nation's foremost experts in Cyber, ISR, Enterprise IT and Intelligence Analysis
We seek to lead with cutting edge technology, high quality development and best value services for both the government and commercial sectors
Our team combines passion, acumen, focus, patriotism, desire, dedication and the love for the job to create value for our customers
We pride ourselves in a rigorous selection process because not only do we want the best, we want the best to want us
Working closely together as part of a service-disabled veteran owned small business, we enjoy a family environment where teammates challenge and elevate each other every day
The Markesman family is always striving to solve tomorrow's problems, today
EOE Statement We are an Equal Opportunity/Affirmative Action Employer
We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state, or local law
This position is currently accepting applications.

  • Meade, United States National Security Agency (NSA) Full time

    ResponsibilitiesThe need to maintain our core Computer Science group is vital to provide the technical capabilities necessary to successfully execute NSA's mission. The increased complexity of supporting NSA's mission requires world class researchers, programmers, and developers who operate in teams in areas such as software engineering, information...

  • Exploitation Analyst

    4 weeks ago


    Meade, United States National Security Agency (NSA) Full time

    ResponsibilitiesNSA stays at the forefront of Cybersecurity. Backed by a talented cadre of capabilities development specialists, NSA operates innovative solutions to gather foreign Intelligence via Computer Network Exploitation. Analysts will receive expert and specialized training on state of the art tools and capabilities. A full career track that covers...


  • Fort Meade, United States IC Defense Full time

    Description: You will act as a Computer Network Exploitation Analyst (CNEA) supporting the X433 ETPG/EAP mission, with specific subject matter expertise on large-scale network mapping and analysis. You will operate in one or more projects for a given Line of Effort, support their operations and analysis, and provide the subject matter expertise and training...


  • Fort Meade, United States IC Defense Full time

    Description: You will act as a Computer Network Exploitation Analyst (CNEA) supporting the X433 ETPG/EAP mission, with specific subject matter expertise on large-scale network mapping and analysis. You will operate in one or more projects for a given Line of Effort, support their operations and analysis, and provide the subject matter expertise and training...


  • Fort Meade, United States IC Defense Full time

    Job DescriptionJob DescriptionDescription:You will act as a Computer Network Exploitation Analyst (CNEA) supporting the X433 ETPG/EAP mission, with specific subject matter expertise on large-scale network mapping and analysis. You will operate in one or more projects for a given Line of Effort, support their operations and analysis, and provide the subject...


  • Fort Meade, United States JY Systems LLC Full time

    Job DetailsJob Location Fort Meade, MD Description The Exploitation Analyst will collaborate to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks. The Exploitation Analyst will: Assess data for new or...

  • Exploitation Analyst

    3 weeks ago


    Fort Meade, United States SOSi Full time

    OverviewSOS International, LLC (SOSi) is seeking Exploitation Analysts (EA) of all skill levels for a variety of roles to support core Intelligence Community (IC) missions on Fort Meade. Other locations include Georgia, Texas and Hawaii. Our national security depends on technology as never before, and this dependence is growing at an ever-increasing rate....

  • Exploitation Analyst

    4 weeks ago


    Fort George G Meade, United States Dhara Consulting Group Full time

    Today - Top Secret/SCI - Mid Level Career (5+ yrs experience) - $178,000 - Occasional travel - Full Scope Polygraph - IT - Security - Fort George G Meade, MD** (ON-SITE/OFFICE)** JACOBS is seeking Exploitation Analysts (EAs) for a variety of roles to support core Intelligence Community (IC) missions through our Next Generation Analysts portfolio. Our...


  • Fort Meade, United States Farfield Systems Full time

    Job DescriptionJob DescriptionAbout Farfield Systems, Inc.At Farfield we are committed to delivering trusted expertise to our government clients.  As we grow, our focus is on increasing opportunities for you to grow with us while still delivering the same excellence customers have grown to expect from us. We continually evaluate our environment to provide a...

  • Malware Analyst II

    3 weeks ago


    Fort Meade, United States TechGuard Security Full time

    Job DescriptionJob DescriptionMalware Analysts support USCYBERCOM Cyber Operations (J3) as part of our mission to provide cyber-focused support for the current and growing mission areas to defending DoD Information Networks, provide support to Combatant Commanders for execution of their missions around the world, and strengthen our nation's ability to...

  • Malware Analyst II

    4 weeks ago


    Fort Meade, United States TechGuard Security Full time

    Malware Analysts support USCYBERCOM Cyber Operations (J3) as part of our mission to provide cyber-focused support for the current and growing mission areas to defending DoD Information Networks, provide support to Combatant Commanders for execution of their missions around the world, and strengthen our nation's ability to withstand and respond to a strategic...

  • Exploitation Analyst2

    3 weeks ago


    Fort Meade, United States Jacobs Full time

    Your Impact:Jacobs is seeking experienced Exploitation Analysts with a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed. Successful candidates may also have experience programming, computer/network security, vulnerability...

  • Exploitation Analyst3

    3 weeks ago


    Fort Meade, United States Jacobs Full time

    Your Impact:JACOBS is seeking Exploitation Analysts (EAs) for a variety of roles to support core Intelligence Community (IC) missions through our Next Generation Analysts portfolio. Our national security depends on technology as never before, and this dependence is growing at an ever-increasing rate. As a cyber professional in the intelligence community, you...


  • Fort Meade, United States SOSi Full time

    OverviewSOS International, LLC (SOSi) is seeking Digital Network Exploitation Analysts(DNEA) of all skill levels for a variety of roles to support core Intelligence Community (IC) missions on Fort Meade. Other locations include Georgia, Texas and Hawaii. Our national security depends on technology as never before, and this dependence is growing at an...

  • Exploitation Analyst4

    3 weeks ago


    Fort Meade, United States Jacobs Full time

    Your Impact:JACOBS is seeking advanced Exploitation Analysts (EAs) who have significant experience in CNO and understand rules/regulations that need to be followed or candidates that are regarded as extremely accomplished and advanced proficient in the computer networking arena. You will support core Intelligence Community (IC) missions through our Next...


  • Fort Meade, United States Two Six Technologies Full time

    Two Six Technologies is looking to add a SeniorVulnerability Analyst to our team. This role will be responsible for identifying and determining attack paths on a given system to develop effective mitigations and detection mechanisms. A strong candidate for this role will have performed vulnerability research or vulnerability analysis for the purpose of...


  • Fort Meade, United States SOS International LLC Full time

    Overview SOS International, LLC (SOSi) is seeking Digital Network Exploitation Analysts (DNEA) of all skill levels for a variety of roles to support core Intelligence Community (IC) missions on Fort Meade. Other locations include Georgia, Texas and Hawaii. Our national security depends on technology as never before, and this dependence is growing at an...


  • Fort Meade, United States Jacobs Full time

    Your Impact:Jacobs is seeking Digital Network Exploitation Analysts (DNEAs) for a variety of roles to support core Intelligence Community (IC) missions. As a cyber professional in the intelligence community, you will work as part of a team on the frontlines against our cyber adversaries. Responsibilities:Evaluate target opportunities using all source data to...

  • Lead Forensic Analyst

    3 weeks ago


    Fort Meade, United States Two Six Technologies Full time

    Two Six Technologies is looking to add a Lead Forensic Analyst to our team. This role will be responsible for performing critical tasks in the information response and media analysis cycles used by our clients. You will use your in depth knowledge of drive forensics to develop and enable mitigations for network exploitation attempts within our client.Job...


  • Fort Meade, United States Jacobs Full time

    Your Impact:Jacobs is seeking Digital Network Exploitation Analysts (DNEAs) for a variety of roles to support core Intelligence Community (IC) missions. As a cyber professional in the intelligence community, you will work as part of a team on the frontlines against our cyber adversaries. Responsibilities: Evaluate target opportunities using all source data...