Digital network analyst - #9804923

Constellation Technologies, Inc


Date: 2 weeks ago
City: Fort Meade, MD
Contract type: Full time
About us: Mission Driven, Employee Focused

At CTI, you'll be at the center of an award-winning corporate culture, breaking technological barriers and solving real-world problems for our federal government customers. We are committed to hiring the best of the best, and in return, we offer a world-class, truly unique employee experience that is rare within our industry.

If you're a technical changemaker with a passion for Cyber Operations, Cloud and Data Analytics, or Engineering, we're looking for you! Love what you do AND where you work - alongside a supportive, innovative team of like-minded individuals. After all, we know that your best work happens when you live your best life, and we do everything we can to make that possible. Are you ready for your best career move? Intel Agency polygraph is strongly preferred.

Due to federal contract requirements, US citizenship and an active TS/SCI security clearance is required for the position.

Description:
As a Digital Network Exploitation Analyst (DNEA) you will, get to work within an agile, fast paced team focused on accomplishing the mission by applying your creativity and cyber domain technical and operational mastery. In this role you will perform malware analysis and reverse engineering in support of incident response, investigative analysis, and research on existing and emerging cyber threats. You will support incidents and investigations that will require you to think like an adversary a both an external actor and insider risk.

The day-to-day:
You'll use use open-source tools such as Metasploit, BurpSuite, nmap, and Wireshark as well as propriety tools to perform Red Teaming and Penetration Testing of the customer's global network; reverse engineer network layouts using data collected from the network itself to identify misconfigurations and to map our where various devices interconnect, communicate and what devices look like that may contribute to the customer's technical objective and document all work performed on the customer's behalf daily where you will comment on what tools were used and devices that were identified and/or assessed. You will proactively identify, define, and advocate technical processes, approaches, and concepts to enhance/improve exploitation efforts; analyze software, firmware, and hardware using a variety of reverse engineering techniques to understand possible security vulnerabilities and potential misconfigurations, working closely with teammates who value innovation and execution and perform in-depth analysis (dynamic/static) on malicious software-based platforms to provide actionable intelligence and as appropriate, provide remediation recommendations.
You'll analyze, disassemble, and reverse-engineer malicious code, documenting and transitioning results into reports, presentations, and technical exchanges; analyze patterns of behavior to identify and determine adversary intent and provides the analysis to the customer in document, briefing, and/or other products as required; and coordinate with Red Team and Risk Management to assess risk to customer assets.

Basic Qualifications:

    • TS/SCI clearance and Full-scope polygraph.
    • Bachelors degree in Computer Science or related field with 7+ years of related experience.
    • Masters degree can be substituted for 12 years of experience and no degree or 8 years of experience and a bachelors degree
    • Have experience with programming languages such as Python, Shell, Assembly, C/C++
    • Familiar with embedded Internet of Things systems, the protocols they use for discovery and communications and the dangers they can present.
    • Ability to combine components into a functioning multi-layer network of heterogeneous devices and applications.
    • Proficient in data exploitation and data analysis.
    • Strong analytical and critical thinking skills, ability to think strategically.
    • Ability to express complex ideas and insights verbally and in writing to a variety of audiences.
    • Working knowledge of Microsoft Windows, UNIX, Linux variant Operating Systems.

Levels (Determined by Experience + Degree):

    • Level 2:
    • Associates Degree + 7 yrs OR
    • Bachelors Degree + 5 yrs OR
    • Masters + 3 yrs OR
    • Doctorate + 2 yrs
    • Level 3:
    • Associates Degree + 10 yrs OR
    • Bachelors Degree + 8 yrs OR
    • Masters + 6 yrs OR
    • PhD + 4 yrs

Preferred Qualifications (desired not required):

    • Advanced GIAC and/or (ISC)2 network/cyber security specialties
    • Familiar with 802-11, Bluetooth, and LTE protocols and technologies
    • Experience with wired telephony technology (hardware or core software)
    • Familiar with mobile telephony technology (hardware or core software)
    • Experience with ubiquitous core network device (switch/router/hub) technology (hardware or core software)

The benefits package:

• Affordable healthcare options with 80% employer paid premium PLUS a company-funded HSA
• Dental insurance with 100% employer paid premium
• Vision with 80% employer paid premium
• Employer paid Life insurance 100%
• Employer paid Short-term and Long-term disability 100%
• Annual training, continued education, and professional memberships reimbursement
• Unlimited access to Red Hat Enterprise Linux, AWS, and NetApp training and accreditation
• Annual reimbursement for technology i.e. phones, computers, printers, etc...
• 401(k) with company match up to 5% with 100% immediate vesting (after 90 days of employment)

The environment and perks:

• Professional development investment and paid time off for training
• Contract and work locations in Maryland, Virginia, Colorado, Texas, Utah, California, Florida and Hawaii.
• Team building events throughout the year such as Destination Family Events, Holiday Party, Monthly Get-Togethers
• Leadership Team engagement and mentorship
• Performance Recognition Program
• Unlimited complimentary branded apparel

Don't see a job opening that's the perfect fit? Apply to our General Position to join our talent pool for consideration for future opportunities.

Know someone else who may be a good fit? Refer them through the CTI External Referral Program and you could receive a one-time referral bonus of up to $10,000 ! Email ************@cti-md.com for more information.

Constellation Technologies is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, religion, creed, color, national origin, ancestry, sex (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, medical condition, marital or domestic partner status, sexual orientation, gender, gender identity, gender expression and transgender status, mental disability or physical disability, genetic information, military or veteran status, citizenship, low-income status or any other status or characteristic protected by applicable law. Job applicants can submit questions about CTI's equal employment opportunity policy to ******@cti-md.com.

How to apply

To apply for this job you need to authorize on our website. If you don't have an account yet, please register.

Similar jobs

Analyst

Constellation Technologies, Inc, Fort Meade, MD
1 week ago
About us: Mission Driven, Employee Focused At CTI, you'll be at the center of an award-winning corporate culture, breaking technological barriers and solving real-world problems for our federal government customers. We are committed to hiring the best of the best, and in return, we offer a world-class, truly unique employee experience that is rare within our industry. If you're a...

Target Digital Network Analyst - Level 2

Amentum, Fort Meade, MD
2 weeks ago
R0100099 On Site Fort Meade, Maryland, United States Full time Amentum is seeking a Target Digital Network Analyst to conduct advanced analysis of collection and open-source data to ensure target continuity, to profile targets and their activities, and develop techniques to gain more target information. Essential Duties: Utilize knowledge of principles and methods of exploiting foreign communications and communication systems...

Exploitation Analyst - Level 2

Amentum, Fort Meade, MD
2 weeks ago
Amentum is seeking Exploitation Analysts to use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur.   Essential Duties: Primary mission is exploitation. Create exploitation plans and make operational adjustments using understanding of network defenses...