Nov 21, 2022

Exploitation Analyst - Entry to Experienced Level (Multiple Locations - GA, HI, MD, TX)

  • National Security Agency
  • Fort Meade, MD, USA

Job Description

As an Exploitation Analyst you will: - analyze all-source data to evaluate foreign target opportunities - understand and evaluate foreign target network - develop strategies against those foreign target networks - partner with operators to conduct operations against foreign networks - inform defensive cyber operations through intelligence collection - work with a diverse team across the Intelligence Community to satisfy critical questions from policy makers, our military and our National Leaders - analyze adversaries' communications across multiple mediums. CNO stays at the forefront of cybersecurity. Backed by a workforce of talented capabilities development specialists, CNO operates innovative solutions to gather Intelligence via Computer Network Exploitation. Analysts will receive expert and specialized training on state of the art tools and capabilities. A full career track that covers beginner to expert development paths awaits those that wish to join NSA's mission. Additionally, there are opportunities to receive specialized pay at specific milestones.

The United States has experienced profound changes that impact the way the National Security Agency (NSA) conducts its mission. The explosion of Internet communications has created a need for the Computer Network Operations (CNO) mission. In order to carry out these functions NSA is looking for exploitation analysts who are highly skilled, want to stay on the leading edge of technology and are impassioned about ensuring the United States maintains a strategic edge in cyberspace. We foster an environment of cooperation and teaming to take full advantage of diverse skills and experiences. These are NOT your average Cyber, Computer Science, Networking or Engineering jobs!

The qualifications listed are the minimum acceptable to be considered for the position. Degree must be in Network Engineering, Systems Engineering, Information Technology, Computer Science, Mathematics, Data Science, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Relevant experience must be in computer or information systems design/development, systems architecture, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, cybersecurity, Machine/Network Virtualization, Cloud Infrastructure, Virtual Containers, Malware Analysis, Operating Systems, Signals Development (SIGDEV), Software/Hardware Reverse Engineering, Network Analysis, Protocol Analysis/Profiling, network exploitation, Persona Analysis, software analysis, debugging, network intrusion detection, and/or systems engineering. If not credited toward education requirement, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience requirement (i.e., 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). Relevant sequences of certifications can substitute for 1 year experience. ENTRY/DEVELOPMENTAL Entry is with a Bachelor's degree and no experience. The following may also be considered for individuals with in-depth experience that is clearly related to the position: an Associate's degree plus 2 years of relevant experience; or at least 18 semester hours of military coursework/training in networking, computer science, or cyber topics plus 2 years of relevant experience. FULL PERFORMANCE Entry is with a Bachelor's degree plus 3 years of relevant experience, or a Master's degree plus 1 year of relevant experience, or a Doctoral degree and no experience. The following may also be considered for individuals with in-depth experience that is clearly related to the position: an Associate's degree plus 5 years of relevant experience; or at least 18 semester hours of military coursework/training in networking, computer science, or cyber topics plus 5 years of relevant experience. SENIOR Entry is with a Bachelor's degree plus 6 years of relevant experience, or a Master's degree plus 4 years of relevant experience, or a Doctoral degree plus 2 years of relevant experience. The following may also be considered for individuals with in-depth experience that is clearly related to the position: an Associate's degree plus 8 years of relevant experience; or at least 18 semester hours of military coursework/training in networking, computer science, or cyber topics plus 8 years of relevant experience.

The ideal candidate is someone with solid decision making skills, ability to react quickly, ability to work in teams, and technical proficiencies in several of the following areas: - Network traffic analysis - Operating system administration (Windows and Unix/Linux) - Network Security - Incident response - Computer and network forensics - Network administration - Vulnerability and malware analysis - Scripting and/or programming - Disparate dataset analysis - Penetration testing / red teaming - Capture the Flag exercises - Teamwork Exploitation Analysts will undergo specialized training for their role. Upon successful completion of training, you may be eligible for training certification program pay incentive.

Salary offers are based on candidates' education level and years of experience relevant to the position and also take into account information provided by the hiring manager/organization regarding the work level for the position. Salary ranges vary by location and work level. This position is hiring for a variety of locations to include: Georgia, Hawaii, Maryland, and Texas. Salary Range: $74,682 - $164,102 (Entry to Senior), All locations. On-the job training, Internal NSA courses, and external training will be made available based on the need and experience of the selectee. Work Schedule: Applicants should be aware that some of these jobs support 24/7 operations based on mission requirements and shift schedules may vary to include night shift.