Senior Exploitation Analyst with Security Clearance
Strategic Technologies Analytics Group (STAG)
2024-11-06 09:42:13
San Antonio, Texas, United States
Job type: fulltime
Job industry: I.T. & Communications
Job description
SENIOR CYBERSPACE EXPLOITATION ANALYST Location: Multiple (San Antonio, TX, Arlington, VA & Langley AFB, VA)
US Citizenship Required: Yes
Clearance: TS / SCI Travel: Limited less than 10% of time.
Salary: Salary will vary pending experience and qualifications. Estimates provided by Indeed do not reflect STAG's salary range. Overview:
Strategic Technologies Analytics Group (STAG) is seeking a Cyberspace Exploitation Analyst to support a Mission Partner. You will collaborate with analytical counterparts across the Intelligence and Operational Communities of Interest to develop access and exploitation analytical strategies against targets of interest. Our ideal candidate will leverage their extensive cyberspace experience to conduct Target Systems Analysis, System of Systems Analysis, Vulnerability Analysis, and Critical Factor Analysis against systems of interest; in order to provide mitigation and security strategies. Applying knowledge gained, you will develop tailored defense solutions to disrupt adversary Access / Exploitation methodologies. As a Subject Matter Expert, you will work with a team to deliver analytical products (orally, visually, and written formats) in accordance with established Department of Defense (DoD) policies, procedures, and requirements. Job Description:
In this role, you will analyze highly complex and diverse mission areas requiring innovative solutions using computer science and engineering practices. Additionally, you will conduct the following duties: Execute target analysis and research to identify communication infrastructures.
Conduct Operational research from various sources / metadata to identify, analyze, and characterize network (logically and physically), telecommunications, and social networks to build a comprehensive operational picture.
Complete risk, forensic, and vulnerability assessments at the network, system, and application levels.
Identify and prioritize vulnerabilities using various Critical Factor Analysis techniques.
Develop defensive countermeasures to prevent access and exploitation on areas of interest.
Conduct gaps and seams analysis to identify additional intelligence and/or capability requirements.
Deliver customized Target/Technical solution via oral, visual, and written analytical products to support our client's cyberspace operational requirements. Basic Qualifications:
TS/SCI clearance with Polygraph and be willing to pass an additional polygraph as required.
Degree in Technical, Engineering, or Computer Science related field. Suitable relevant technical experience can substitute degree requirements as follows: Associates or less (12 years), Bachelors (8 years), Masters and above (4 years). Demonstrated advanced knowledge of internet protocols, internet protocols, telecommunication technologies, and intra-/internet routing principals. Demonstrated advance knowledge of software applications, operating systems, and databases within telecommunications architecture. Preferred Qualifications:
Excellent written and verbal communication skills with the ability to present complex technology into layman terms.
Self- motivated, creative, willing to work as a member of a team; who can organize and manage individual schedule.
Experience in programing and machine language to read, interpret, write, modify, and execute simple scripts on Windows, Unix, and/or mobile operating systems.
Knowledge in reverse engineering concepts (e.g. hex editing, binary packaging utilities, debugging, and strings analysis) to identify function and ownership of remote tools.
Successful completion of any of the following courses or certifications: Certified Ethical Hacking Certification, Certified Cyber Fires Planner, Cisco Certified Network Associate Certification, 39th IOS Cyber Warfare Operations Course, Joint Network Attack Course (JNAC), Joint Network Attack Course (JNAC), Joint Cyber Analysis Course (JCAC), Joint Cyber Operations Planners Course (JCOPC), Advanced Cyber Warfare Courses (JACWC/PACWC/NSA E and A courses), EC-Council Licensed Penetration Tester (Master) Credential, GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), Certified Penetration Tester (CPT), Targeting Intelligence Formal Training Unit, Joint Targeting School, and/or Remote Interactive Operator Training About Strategic Technologies Analytics Group (STAG): STAG is a premier solutions provider to the National Security and Defense communities around the world. We are Veteran-Owned Emerging Small Business based in San Antonio, Texas. STAG provides multi-domain technology solutions coupled with the best professionals sourced from their respective fields of intelligence, cyber, electronic warfare and special operations communities. Our team members serve at all levels of operations from on-keyboard cyber warfare experts to national level advisors on intelligence operations. STAG utilizes proven methodologies that produces high quality innovative solutions addressing some of our Nation's most challenging problems. EEO Statement
STAG is committed to providing equal opportunity for all employees and applicants without regard to race, color, religion, national origin, sex, age, marital status, sexual orientation, disability, political affiliation, personal appearance, family responsibilities, matriculation, and/or any other characteristic protected under federal, state, and/or local laws. STAG's policy regarding equal employment opportunity applies to all aspects of employment, including recruitment, hiring, job assignments, promotions, working conditions, scheduling, benefits, wage and salary administration, disciplinary action, termination, social, educational, and recreational programs.