Exploitation Analyst, Mid (EA2)

Responsibilities

The Exploitation Analyst collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.

Specific responsibilities:

  • Assess data for new or continued opportunities
  • Communicate complex information concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means
  • Create comprehensive strategies to develop and maintain accesses, conduct remote exploitation and provide technical assistance
  • Analyze intelligence information, technical data, and exploitation opportunities
  • Evaluate, analyze, and synthesize large quantities of data into high quality, fused targeting/intelligence products

Qualifications

Basic Qualifications:

  • A Bachelor’s degree plus 5 years of relevant experience, or a Master’s degree plus 3 years of relevant experience, or a Doctoral degree and 2 years of relevant experience. The following may also be considered for individuals with in-depth experience that is clearly related to the position: an Associate’s degree plus 7 years of relevant experience; or at least 18 semester hours of military coursework/training in networking, computer science, or cyber topics plus 7 years of relevant experience.
  • Degree must be in Network Engineering, Systems Engineering, Information Technology or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
  • Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance and/or systems engineering, additionally, must have experience in network or system administration. If not credited toward education requirement, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT). Cyber Defense Operations will be considered towards the relevant experience requirement (i.e., 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months of experience).
  • Active TS/SCI security clearance with a current polygraph is required

Desired Qualifications:

  • CEH Certified Ethical Hacker
  • CFR CyberSec First Responder
  • CySA+ CompTIA Cybersecurity Analyst
  • GCFA GIAC Certified Forensics Analysis
  • GCIH GIAC Certified Incident Handler
  • SCYBER Cisco Cybersecurity Specialty Certification
  • CNDSP Computer Network Defense Service Provider
  • CSSP-IR DoD Cyber Security Service Provider for Incident Responder

#MPOJobs

#NextGenFF

#AJCM

Peraton Overview

Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our employees do the can’t be done, solving the most daunting challenges facing our customers.

Target Salary Range

$112,000 – $179,000. This represents the typical salary range for this position based on experience and other factors.

EEO

An Equal Opportunity Employer including Disability/Veteran.

Job Category
Data and Analytics
Job Type
Full Time/Permanent
Salary
USD 112,000.00 - 179,000.00 per year
Country
United States
City
Annapolis
Career Level
unspecified
Company
Peraton
JOB SOURCE
https://careers-peraton.icims.com/jobs/135315/exploitation-analyst%2c-mid-%28ea2%29/job