experience. Interested in a career that bridges the gap between Supply Chain and Technology? Elemica, an award-winning, digital supply chain company in the SaaS community, is seeking experienced Network Platform Sr. Product Analyst. This is an opportunity to join a growing company of talented and committed individuals, unified in the common goal of exceeding our client's expectations. … Bike/Cycle-to-Work Offerings Benefits-in-kind/Wellness Stipends Rewards & Recognition including Years of Service Awards Quarterly Employee Engagement Events Responsibilities & Objectives As a Senior Product Analyst at Elemica, you will play a pivotal role in bridging the gap between business users and technical teams, ensuring our product portfolio's successful development and optimization. You will … Build team camaraderie across multiple business units through strong communication, relationship building, and regular touchpoints What You'll Need 2-3 years of experience as a SaaS software product analyst At least 4+ years of experience with B2B multi-enterprise supply chain business networks, supply chain software, supplier, carrier, and/or shipper integration, as well as structured and More ❯
We proactively build trusted relationships with our peers, partners and customers, and take ownership for our actions-always striving to do the right thing. The Kratos Spectral Services (KSS) Network Operations Center (NOC) leverages the Kratos Global Sensor Network (KGSN) to deliver solutions for multiple Kratos customers. Operational roles within the Kratos NOC include: Monitoring satellite communications (SATCOM … toward more senior roles. KSS is interested in hiring junior and highly experienced candidates to support our diverse missions and customer base. The duties and responsibilities of the SATCOM NetworkAnalyst include, but are not limited to: Perform primary customer interface, respond to all operational questions and requests, and refer capability inquiries to Management. NOC SNAs interface with … Review periodic customer-supplied data and status reports (e.g., satellite payload reports, transmission plans, etc.) Coordinate investigation of anomalous indications with customer-defined assets and satellite operators. Utilize all Network Operation Center (NOC) subsystems proficiently to support operations as required. Perform all NOC position duties in accordance with published methods and procedures. All SNA positions support a 24/ More ❯
Digital Network Exploitation Analyst Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: None Type of Travel: None What You Will Do: Want to stretch your skills and knowledge in the Offensive Cyber domain? You will get to work with an agile, fast … You will use open source tools such Metasploit, BurpSuite, nmap and Wireshark as well as proprietary tools to perform red teaming and penetration testing of the client's global network You will reverse engineer network layouts using data collected from the network itself to identify misconfigurations and to map out where various devices interconnect, communicate and what … they can present Understand the concepts behind software defined radios (SDR) and how to capture and alter capture RF communications Ability to combine components into a functioning multi-layer network of heterogeneous devices and applications Working knowledge of Microsoft Windows Operating System and/or U NIX Working knowledge database Administration and application development with Oracle, PostresSQL, SQL Server More ❯
DIA Director. You will witness the impact of your analysis indirectly on the battlefield and through strategic decisions made by our leaders throughout the Intelligence Community. Responsibilities: All-Source Analyst - Conducts analysis using intelligence and information from multiple sources to assess, interpret, forecast, and explain a range of national security issues and developments that are regional or functional in … are regional or functional in nature. Provides all-source analytic support to collections, operations, investigations, and other defense intelligence analytic requirements. Provides all-source analysis with a focus on network analysis to enable CWMD, counter proliferation, counter-improvised threats, CWMD mission support, CWMD capabilities support, CWMD partner support, and nuclear enterprise defense. Provides innovative research and analysis to better More ❯
Job Number: 291 Job Category: GovTech Job Title: COMPUTER NETWORK DEFENSE ANALYST 3 (291) - MARYLAND -URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Annapolis Junction MD Salary: 150K- 155K Background Relevant experience must be in computer or information systems design/development/analysis. In addition … it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Identify, analyze, map, and/or protect against vulnerabilities, intrusions and threats to computer network systems Requirements AA + 10 yrs or B.A. + More ❯
Guidant global is seeking a skilled and experienced networkanalyst with a strong understanding of protocols. They should have a proven track record of utilising a range of network analysis tools, including common external tools such as wireshark and tcpdump, and potentially tooling. DV Clearance is required for this role. Responsibilities Using their knowledge of network analysis, work towards advancing Research’s protocol analysis and digital currency efforts by developing and applying techniques to mission data. Work with Projects to determine their network analysis requirements and use knowledge to apply known techniques. Use or build familiarity with tooling to apply techniques to mission data. Work with data scientists and analysts to ensure information extracted … team to enhance our collective capabilities. To facilitate these requirements, they will be required to work in a client environment, for a minimum of four days a week. Skills: Network analysis, including using common tools such as wireshark Protocol analysis and strong understanding of protocols Behavioural Strong analytical and problem-solving skills Excellent communication skills, highly enthusiastic team player More ❯
Job Number: 336 Job Category: GovTech Job Title: CYBERSECURITY NETWORKANALYST (336) - MARYLAND -URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 158K-175K Background Experience with computer network exploitation, construction, and diagnostics of computer networks, network analysis, network threats … and risks, incident response, and database research is required Maintain awareness of applicable computer network exploitation policies, regulations, and compliance documents Analyze network packet information, Windows and Linux/Unix OS system data, executable file data, host data, and metadata to identify and characterize anomalies on USG networks Provide reporting on activities and assist in the development and … system Requirements Bachelor's degree in software engineering, computer science, engineering, or related field from an accredited college or university 2 years of demonstrated experience in cybersecurity techniques and network analysis; 3 years of demonstrated experience in intrusion analysis and incident responses Preferred Demonstrated experience with TCP/IP fundamentals, Windows and Linux/Unix Operating Systems, and supporting More ❯
The Cybersecurity NetworkAnalyst (CNA) performs systems and data threat analysis and enterprise-wide monitoring of Government systems and networks for insider threats. Performs baseline audits of usage of all Agency automated information systems and provides feedback in the form of written and oral reports and metrics. Performs focused monitoring capabilities on a case-by-case basis. Performs … testing of new software releases/upgrades and policies to ensure compatibility with enterprise applications. Performs network maintenance checks on requisite insider threat monitoring software and third party architecture. The CNA creates policies, performs data analysis, product configuration support, network and database support, and maintenance of the operating server, agent baseline, and database repository; performs software policy analysis … Science, Cybersecurity, Engineering, or related field from an accredited college or university is required. Five (5) years of Cybersecurity Threat Analysis experience in the following disciplines: Cybersecurity techniques and Network Analysis, Insider Threat Analysis software, TCP/IP fundamentals, Windows Operating Systems and supporting Office applications, real-world incident management and incident response. More ❯
Job Number: 347 Job Category: GovTech Job Title: TARGET DIGITAL NETWORKANALYST 4 (347) - UTAH - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Draper UT Salary: 170K-180K Background Conducting advanced analysis of collection and open-source data to generate insights and leads, ensure target continuity … designated target sets Identifying intelligence gaps to tailor current collection or enable new collection to close the gaps Employing multiple analysis disciplines such as pattern recognition against targets' communications, network usage and digital footprints Applying knowledge and understanding of IC needs and missions, as well as the targets' culture, behaviors, and communications technologies Mentoring other analysts on the tools … Requirements AA + 13 yrs or B.A. + 11 yrs or Masters +9 yrs or PhD + 7 yrs Excellent communication and collaboration skills to interface across NSA Build network and PERSONA targeting Highly proficient in Agency tools and access development Has worked with/used CNO and CNE analytical tools Preferred Understanding of network exploitation More ❯
Job Number: 301 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 2 (301) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 120K- 130K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist … in developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Develop new tradecraft needed to perform this analysis as … Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such More ❯
Job Number: 304 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 2 (304) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 120K- 130K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist … in developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Develop new tradecraft needed to perform this analysis as … Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such More ❯
Job Number: 288 Job Category: GovTech Job Title: TARGET DIGITAL NETWORKANALYST 4 (288) - UTAH -URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Draper UT Salary: 175K- 180K Background Conducting advanced analysis of collection and open-source data to generate insights and leads, ensure target continuity … designated target sets Identifying intelligence gaps to tailor current collection or enable new collection to close the gaps Employing multiple analysis disciplines such as pattern recognition against targets' communications, network usage and digital footprints Applying knowledge and understanding of IC needs and missions, as well as the targets' culture, behaviors, and communications technologies Mentoring other analysts on the tools … collaboration skills to interface across NSA Strong target and content discovery skills Worked with/used CNO and CNE analytical tools Strong verbal and written communication skills Understanding of network exploitation Preferred Highly proficient in Agency tools Build network and PERSONA targeting and access development More ❯
Job Number: 294 Job Category: GovTech Job Title: COMPUTER NETWORK DEFENSE ANALYST 3 (294) - UTAH - URGENT Job Type: Full-time Clearance Level: TS/SCI CI Poly Work Arrangement: On-site Job Location: Bluffdale UT Salary: 135K -140K Background Continuously monitor network activity to detect and respond to potential security incidents Conduct intrusion detection and incident … response activities Analyze correlated log data to identify potential threats or anomalies Develop and implement custom Snort rules to enhance network intrusion detection capabilities Recognize and differentiate between legitimate network activity and malicious intrusions or compromises Communicate effectively with internal teams and external partners across various levels Communicate effectively with internal teams and external partners across various levels More ❯
Job Number: 394 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 3 (394) - ALASKA - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: AK Anchorage Salary: 135K - 145K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in … developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Involved in developing new tradecraft needed to perform this analysis … Requirements AA + 10 yrs or B.A. + 8 yrs or Masters + 6 yrs or PhD + 4 yrs Excellent communication and collaboration skills to interface across NSA Network traffic and exploits experts Collect and analyze network traffic Identify Network anomalies Have a intermediate/advanced knowledge on-VPNs, PCAPs, Encryption, leverage/engaged with 2P More ❯
Job Number: 302 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 2 (302) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 125K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in … developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Involved in developing new tradecraft needed to perform this analysis … + 2 yrs Relevant experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such More ❯
Job Number: 303 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 2 (303) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 125K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in … developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Involved in developing new tradecraft needed to perform this analysis … + 2 yrs Relevant experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such More ❯
Job Number: 308 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 3 (308) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Annapolis Junction MD Salary: 150K- 155K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist … in developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Involved in developing new tradecraft needed to perform this … + 4 yrs Relevant experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such More ❯
Job Number: 395 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 4 (395) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: AK Anchorage Salary: 210K -215K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist … in developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Involved in developing new tradecraft needed to perform this … + 7 yrs Relevant experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such More ❯
Job Number: 312 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 3 (312) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 150K- 155K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist … in developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Involved in developing new tradecraft needed to perform this … + 4 yrs Relevant experience must be in computer or information systems design/development/analysis. May also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such More ❯
Job Number: 305 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 3 (305) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Annapolis Junction MD Salary: 150K -154K Background Evaluate target opportunities using all source data to understand and map target networks, and to … assist in developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Involved in developing new tradecraft needed to perform … yrs Relevant experience must be in computer or information systems design/development/analysis, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as More ❯
Belay is hiring Digital Network Exploitation Analysts (DNEA) to support a brand new contract! The DNEA evaluates target opportunities and strategizes activities against particular networks using all source data to understand and map target networks and assist in developing detailed exploitation and operations plans. The Digital Network Exploitation Analyst will have a solid understanding of logical/… physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network; has a working knowledge of the principles and methods used to identify, collect, analyze process and disseminate information in accordance with established requirements and priorities; possesses an understanding of and experience in the SIGINT disciplines of collection, target development, and … Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as More ❯
Praescient Analytics has an immediate opening for an Army Computer Network Operations (CNO) Analyst to support the 1st IO Command at Fort Belvoir, VA. As an Army CNO Analyst, you will provide current operations and plans support in the 2nd BN S3 (Operations) section. 1st Information Operations Command provides IO support to the Army and other military … forces through deployable IO support teams, IO Reachback planning and analysis and the synchronization and conduct of Army Computer Network Operations (CNO), in coordination with other CNO and network operations stakeholders, to operationally integrate IO, reinforce forward IO capabilities, and to defend cyberspace in order to enable IO throughout the information environment. Responsibilities: Plans, synchronizes, and conducts Army … Computer Network Operations (CNO) through deployed CNO support teams and CNO reach back capabilities to gain and maintain information dominance throughout Cyberspace. Will support Computer Defense Assistance Program, computer network operations planning and exercise support, penetration testing and network damage assessment. Required Training/Certification: Active TS/SCI clearance or higher (Must Have) Army Information Operations More ❯
skilled teams with innovative methods to deliver responsive and actionable solutions to the operational community. STAG provides the high-performance professionals needed to support next-generation warfighters. CYBERSPACE DIGITAL NETWORK INTELLIGENCE ANALYST Location: San Antonio, TX US Citizenship Required: Yes Clearance: TS/SCI with Poly Travel: Limited less than 10% of time . Overview: Strategic Technologies Analytics … Group (STAG) is seeking a Cyberspace Digital Network Intelligence Analyst to support a Department of Defense (DOD) Customer. You will collaborate with analytical counterparts across the Intelligence and Operational Communities of Interest to develop access and exploitation analytical strategies against targets of interest. Our ideal candidate will leverage their cyberspace experience to conduct open/all-source research … network vulnerability analysis, and critical factor analysis to support cyberspace operations. As a Subject Matter Expert, you will work with a team to deliver analytical products (orally, visually, and written formats) in accordance with established DOD policies, procedures, and requirements. Job Description: In this role, you will analyze highly complex and diverse mission areas requiring innovative solutions using various More ❯
Weeghman & Briggs is seeking Digital Network Exploitation Analysts/DNEA of multiple levels. Join our growing team and support an important mission within the Federal Government. Location: Annapolis Junction & Utah (DNEA3) Clearance Required: TS/SCI w/Polygraph As a Digital Network Exploitation Analyst, your responsibilities will include: evaluate target opportunities using all source data to … understand and map target networks, and to assist in developing detailed exploitation and operations plans. analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network. be involved … Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be More ❯
Our Arlington VA based client is looking for Network Based Systems Analyst. If you are qualified for this position, please email your updated resume in word format to Responsibilities: • Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources • Coordinate with enterprise-wide cyber defense staff to validate network alerts • Perform … correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack • Provide daily summary reports of network events and activity relevant to cyber defense practices Receive and analyze network alerts from various sources within the enterprise and determine possible causes of alerts • Provide timely detection … and analysis of system activity to identify malicious activity • Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information - Identify and analyze anomalies in network traffic using metadata - Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools - Identify applications and operating systems of a network device based on More ❯