Please scroll down, To apply

Digital Network Exploitation Analyst with Security Clearance

hiring now

Cornerstone Defense

2024-11-05 06:41:30

Job location Hilo, Hawaii, United States

Job type: fulltime

Job industry: I.T. & Communications

Job description

Clearance: Active TS/SCI w/ Polygraph needed to apply Company Overview: Cornerstone Defense is the Employer of Choice within the Intelligence, Defense, and Space communities of the U.S. Government. Realizing early on that our most prized assets are our employees, we continually focus our attention on improving the overall work/life experience they have supporting the mission. Our Team is pushed every day to use their industry leading knowledge to provide end-to-end solutions to combat our nation's toughest and most secure problems. If you are looking for a place to not only be professionally challenged, but encouraged and supported by a company that cares, don't look any further than Cornerstone Defense. Computer Network Defense Analyst Use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur. Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems. Work may span the gamut of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that support it all. Career advancement as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security. Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise. Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights. Distill, document, contextualize and share your findings including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers. Qualifications Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Up to 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an Associate degree. Experience: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20- to 24-week courses will count as 6 months of experience; 10-14 weeks will count as 3 months of experience). In some cases, foreign language proficiency may also be used to satisfy experience requirements; recent Interagency language Roundtable (ILR) scores are required to substantiate your proficiency level. The total of all experience equivalencies is capped at half of the required years of experience. Level 1 2 years' applicable experience with a bachelor's degree, OR 4 years' applicable experience with associate degree Level 2 2 years' applicable experience with a PhD, OR 3 years' applicable experience with a master's degree, OR 5 years' applicable experience with a bachelor's degree, OR 7 years' applicable experience with an associate degree Level 3 4 years' applicable experience with a PhD, OR 6 years' applicable experience with a master's degree, OR 8 years' applicable experience with a bachelor's degree, OR 10 years' applicable experience with an associate degree Level 4 7 years' applicable experience with a PhD, OR 9 years' applicable experience with a master's degree, OR 11 years' applicable experience with a bachelor's degree, OR 13 years' applicable experience with an associate degree Digital Network Exploitation Analyst Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans. Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network. Be involved in developing new tradecraft needed to perform this analysis as technologies evolve. Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise. Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights Distill, document, contextualize and share your findings including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers. Qualifications Education: Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Experience: Relevant experience must be in computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) may be considered towards the relevant experience requirement (i.e., 24-week JCAC course may count as 6 months of experience).

Inform a friend!

<!– job description page –>
Top