Digital Network Exploitation Analyst 1-4 (DNEA)
Salary undisclosed
Apply on
Original
Simplified
Amentum is seeking multiple Digital Network Exploitation Analyst 1-4 (DNEA) to perform technical analysis of metadata and content to ensure target continuity, to evaluate intelligence value of targets, and develop techniques to establish continued collection or gain additional target information.
Essential Duties:
Digital Network Exploitation Analyst 1
Minimum Requirements:
Digital Network Exploitation Analyst 2
Minimum Requirements:
Digital Network Exploitation Analyst 3
Minimum Requirements:
Digital Network Exploitation Analyst 4
Minimum Requirements:
Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran's status, ancestry, sexual orientation, gender identity, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal EEO laws and supplemental language at EEO including Disability/Protected Veterans and Labor Laws Posters.
Essential Duties:
- The DNEA will blend traditional intelligence analysis with a technical understanding of communication infrastructures, physical and logical network topographies, protocols and applications, and trending technologies.
- Conducting target research from various sources, identifying vulnerabilities, indicators and warnings, performing intelligence analysis through the application of analytic tools and techniques, providing government client with analysis of targeting options, and provide analytic tradecraft mentorship and training as needed.
- Actively analyzes and manages projects, capabilities, policies and procedures.
- Analyzes collection-related information to guide tasking, identify problems, and assist with collection management; and recognizes essential elements of information to enable endpoint opportunities.
- Conduct SIGINT disciplines of collection, target development, and tasking.
- Understand logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.
- Shift-work may be required.
Digital Network Exploitation Analyst 1
Minimum Requirements:
- Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.
- Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.) preferred. 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.
- Minimum 2 years of relevant experience in computer or information systems design/development/analysis, engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
- Requires understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.
- Possess a working knowledge of the principles and methods used to identify, collect, analyze process and disseminate information in accordance with established requirements and priorities.
- Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered toward the relevant experience requirement.
Digital Network Exploitation Analyst 2
Minimum Requirements:
- Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.
- Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.) preferred. 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.
- Minimum 11 years of relevant experience in computer or information systems design/development/analysis, engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
- Possess a working knowledge of the principles and methods used to identify, collect, analyze process and disseminate information in accordance with established requirements and priorities.
- Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered toward the relevant experience requirement.
Digital Network Exploitation Analyst 3
Minimum Requirements:
- Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.
- Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.) preferred. 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.
- Minimum 8 years of relevant experience in computer or information systems design/development/analysis, engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
- Possess a working knowledge of the principles and methods used to identify, collect, analyze process and disseminate information in accordance with established requirements and priorities.
- Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered toward the relevant experience requirement.
Digital Network Exploitation Analyst 4
Minimum Requirements:
- Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.
- Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.) preferred. 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.
- Minimum 11 years of relevant experience in computer or information systems design/development/analysis, engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
- Possess a working knowledge of the principles and methods used to identify, collect, analyze process and disseminate information in accordance with established requirements and priorities.
- Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered toward the relevant experience requirement
Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran's status, ancestry, sexual orientation, gender identity, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal EEO laws and supplemental language at EEO including Disability/Protected Veterans and Labor Laws Posters.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job Similar Jobs