Digital Network Exploitation Analyst (DNEA) with Security Clearance Information Technology (IT) - Severn, MD at Geebo

Digital Network Exploitation Analyst (DNEA) with Security Clearance

MultiLingual Solutions, Inc(MLS) is a comprehensive foreign language services firm that provides full- spectrum linguistic, analytical and operational support to U.SGovernment and private sector customersMLS provides services in over 100 languages and resources in more than 60 countriesMLS specializes in mobilizing the linguistic, technical and management personnel needed to meet critical communications and operational objectivesBased in the Washington, D.CMetropolitan area, MLS is accessible 24/7 to respond to short-fused, ongoing and surge requirements worldwideWe are actively seeking Digital Network Exploitation Analysts of all skill levels to join our teamDigital Network Exploitation Analyst evaluate target opportunities and strategize activities against networks using all source data to understand and map target networks and assist in developing detailed exploitation and operations plansJob Description Network Exploitation Analysts have a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network; have working knowledge of the principles and methods used to identify, collect, analyze process and disseminate information in accordance with established requirements and priorities; possesses an understanding of and experience in the SIGINT disciplines of collection, target development, and tasking; actively analyze and manage projects, capabilities, policies and procedures; analyze collection-related information to guide tasking, identify problems, and assist with collection management; and recognize essential elements of information to enable endpoint opportunitiesRequirementso Active TS/SCI with polygrapho Relevant experience must be in computer or information systems design/development/analysisIn addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.o Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will count as 6 months of experience)Educationo Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)Up to 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an Associate degreeDigital Network Exploitation Analyst Level 1 Associate degree
4 years, or Bachelors
2 years, or Masters/PhD
0 years Digital Network Exploitation Analyst Level 2 Associate degree
7 years, or Bachelors
5 years, or Masters
3 years, or PhD
2 years Digital Network Exploitation Analyst Level 3 Associate degree
10 years, or Bachelors
8 years, or Masters
6 years, or PhD
4 years Digital Network Exploitation Analyst Level 4 Associate degree
13 years, or Bachelors
11 years, or Masters
9 years, or PhD
7 years Contingent Upon Contract Award Apply to this job. Think you're the perfect candidate? Apply on company site $(document).ready( function() $(#ads-desktop-placeholder).html(
n
n
n Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.