Digital Network Exploitation Analyst (Dnea 2) with Security Clearanceother related Employment listings - Fort George G Meade, MD at Geebo

Digital Network Exploitation Analyst (Dnea 2) with Security Clearance

Digital Network Exploitation Analyst (DNEA 2) Job Category:
Information Technology Time Type:
Full time Minimum Clearance Required to Start:
TS/SCI with Polygraph Employee Type:
Regular Percentage of Travel Required:
Up to 10% Type of Travel:
Local As cyber threats evolve and proliferate at a rapid pace, CACI is at the forefront of cyber network operations (CNO) and enabling information superiority.
We help our customers prepare, defend, and sustain their cyber missions and protect their enterprises against cyber threats.
CACI is seeking Digital Network Exploitation Analysts (DNEAs) of all skill levels for a variety of roles to support core Intelligence Community (IC) missions through our Next Generation Analysts portfolio.
Our national security depends on technology as never before, and this dependence is growing at an ever-increasing rate.
As a cyber professional in the intelligence community, you will work as part of a team on the frontlines against our cyber adversaries.
CACI needs cyber professionals with technical expertise and a driving desire to remain at the forefront of their field.
These opportunities will give you the chance to showcase your talent and expertise while working on the cutting edge of national cybersecurity missions.
Join us in helping advance our national security interests as part of the world's most advanced team of cyber professionals.
What You'll Get to Do As a Digital Network Exploitation Analyst, you will:
evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans.
analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.
be involved in developing new tradecraft needed to perform this analysis as technologies evolve.
be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.
apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers.
You'll Bring These
Qualifications Education:
Degree in Computer Science.
Degree in related fields (eg, Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas:
algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics).
Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major.
Relevant
Experience:
Relevant experience must be in computer or information systems design/development/analysis roles.
In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) may be considered towards the relevant experience requirement (ie, 24-week JCAC course may count as 6 months of experience).
Active TS/SCI with polygraph Specific labor category determined by years of experience
educational degrees:
Level 2 2 years' applicable experience with a PhD, OR 3 years' applicable experience with a master's degree, OR 5 years' applicable experience with a bachelor's degree, OR 7 years' applicable experience with an associate degree What We Can Offer You:
We offer competitive salaries and a comprehensive set of benefits, including tuition reimbursement and advanced training in job-relevant subjects We've been named a Best Place to Work by the Washington Post.
Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
We are mission-oriented and ever vigilant in aligning our solutions with the nation's highest priorities.
For over 55 years, the principles of CACI's unique, character-based culture have been the driving force behind our success.
MOS Codes 35N ASI T5 (TDNA) CTR, CTN, H11A 2621, 2629, 2631, 2641, 2691 1N2x1, Air Force Fusion Analyst (1N4x1) Intelligence Specialist (IS); Officer Specialty:
CG-CYB10 series Company Overview:
At CACI, you will have the opportunity to make an immediate impact by providing information solutions and services in support of national security missions and government transformation for Intelligence, Defense, and Federal Civilian customers.
CACI is an Equal Opportunity Employer - Females/Minorities/Protected Veterans/Individuals with Disabilities.
As a federal contractor, CACI is subject to any federal vaccine mandates or other customer vaccination requirements.
All new hires are required to report their vaccination status.
.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.