STAG Careers

Digital Network Exploitation Analyst (DNEA)

Strategic Technologies Analytics Group (STAG) is a premier global solutions provider for national security and defense communities. STAG provides technical expertise in planning, collection, analysis, and reporting capabilities aligned to Joint Doctrine in Planning, Intelligence, Targeting, and Operations. STAG employs highly skilled teams with innovative methods to deliver responsive and actionable solutions to the operational community. STAG provides the high-performance professionals needed to support next-generation warfighters.


DIGITAL NETWORK EXPLOITATION ANALYST (DNEA)

Location: San Antonio, TX

US Citizenship Required: Yes

Clearance: TS / SCI with Poly

Travel: Limited to less than 10% of the time.


Overview:

Strategic Technologies Analytics Group (STAG) is seeking a Digital Network Exploitation Analyst to support a Department of Defense (DOD) customer. You will collaborate with analytical counterparts across the Intelligence and Operational Communities of Interest to develop access and exploitation analytical strategies against targets of interest. Our ideal candidate will leverage their extensive cyberspace experience to conduct Target Systems Analysis, System of Systems Analysis, Vulnerability Analysis, and Critical Factor Analysis against systems of interest. Applying knowledge gained, you will develop tailored solutions for Access / Exploitation methodologies incorporating weaponeering analysis as well as intelligence and cyberspace capability limitations required to execute operations. As a subject matter expert, you will work with a team to deliver analytical products (orally, visually, and in written formats) in accordance with established DOD policies, procedures, and requirements.


Job Description:

In this role, you will analyze highly complex and diverse mission areas requiring innovative solutions using computer science and engineering practices. Additionally, you will conduct the following duties:

Execute target analysis and research to identify communication infrastructures supporting USCYBERCOM and DOD customer objectives.

Conduct operational research from various sources/metadata to identify, analyze, and characterize network (logically and physically), telecommunications, and social networks to build a comprehensive operational picture.

Conduct target research from various sources, identifying vulnerabilities, indicators and warnings, performing intelligence analysis through the application of analytic tools and techniques, providing government client with analysis of targeting options, and provide analytic tradecraft mentorship and training as needed.

Identify and prioritize vulnerabilities using various Critical Factor Analysis techniques.

Analyze data to identify new access development opportunities for follow-on collection requirements.

Develop tailored access and exploitation strategies against targets of interest.

Create weaponeering solutions with known capabilities (existing and/or developmental) to meet operational requirements.

Conduct SIGINT disciplines of collection, target development, and tasking.

Understand logical/physical IP core infrastructure, communication devices, and how they connect to networks, and the traffic movements in a network.

Conduct gaps and seams analysis to identify additional intelligence and/or capability requirements.

Leverage experience in computer or information systems design/development/analysis, engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.

Identify, collect, analyze process and disseminate information in accordance with established requirements and priorities.

Deliver customized target/technical solutions via oral, visual, and written analytical products to support client cyberspace operational requirements.


Basic Qualifications:

TS/SCI clearance with Polygraph or be willing to pass a polygraph as required.

BS or BA degree in Technical, Engineering, or Computer Science related field with at least 4 years of relevant experience or at least 8 years of relevant technical experience in lieu of a degree.

Demonstrated advanced knowledge of internet protocols, telecommunication technologies, and internet routing principles.

Proven mastery in offensive cyber operations (OCO) environments.

Demonstrated advanced knowledge of software applications, operating systems, and databases within telecommunications architecture.


Preferred Qualifications:

Excellent written and verbal communication skills with the ability to present complex technology in layman's terms.

Self- motivated, creative, willing to work as a member of a team, and can organize and manage individual schedule.

Experience in programming and machine language to read, interpret, write, modify, and execute simple scripts on Windows, Unix, and/or mobile operating systems.

Knowledge in reverse engineering concepts (e.g. hex editing, binary packaging utilities, debugging, and strings analysis) to identify function and ownership of remote tools.

Successful completion of any of the following courses or certifications: Certified Ethical Hacking Certification, Certified Cyber Fires Planner, Cisco Certified Network Associate Certification, 39th IOS Cyber Warfare Operations Course, Joint Network Attack Course (JNAC), Joint Cyber Analysis Course (JCAC), Joint Cyber Operations Planners Course (JCOPC), Advanced Cyber Warfare Courses (JACWC/PACWC/NSA E and A courses), EC-Council Licensed Penetration Tester (Master) Credential, GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), Certified Penetration Tester, Targeting Intelligence Formal Training Unit, Joint Targeting School, and/or Remote Interactive Operator Training.


About Strategic Technologies Analytics Group (STAG): STAG is a premier solutions provider to the National Security and Defense communities around the world. We are a Veteran-Owned Emerging Small Business based in San Antonio, Texas. STAG provides multi-domain technology solutions coupled with the best professionals sourced from their respective fields of intelligence, cyber, electronic warfare, and special operations communities. Our team members serve at all levels of operations, from on-keyboard cyber warfare experts to national-level advisors on intelligence operations. STAG utilizes proven methodologies that produce high-quality innovative solutions addressing some of our Nation’s most challenging problems.


EEO Statement

STAG is committed to providing equal opportunity for all employees and applicants without regard to race, color, religion, national origin, sex, age, marital status, sexual orientation, disability, political affiliation, personal appearance, family responsibilities, matriculation, and/or any other characteristic protected under federal, state, and/or local laws. STAG’s policy regarding equal employment opportunity applies to all aspects of employment, including recruitment, hiring, job assignments, promotions, working conditions, scheduling, benefits, wage and salary administration, disciplinary action, termination, social, educational, and recreational programs.


Operations

San Antonio, TX

Compartilhar no:

Termos de serviçoPrivacidadeCookiesDesenvolvido pela Rippling