Digital Network Exploitation Analyst 1-4 (DNEA)

Posted 23 Days Ago
Be an Early Applicant
Fort Meade, MD
Mid level
Security • Cybersecurity
The Role
The Digital Network Exploitation Analyst conducts analysis on metadata and content, manages projects, and identifies vulnerabilities while mentoring clients on targeting options and SIGINT collection techniques.
Summary Generated by Built In

Amentum is seeking multiple Digital Network Exploitation Analyst 1-4 (DNEA) to perform technical analysis of metadata and content to ensure target continuity, to evaluate intelligence value of targets, and develop techniques to establish continued collection or gain additional target information.

Essential Duties:

  • The DNEA will blend traditional intelligence analysis with a technical understanding of communication infrastructures, physical and logical network topographies, protocols and applications, and trending technologies.
  • Conducting target research from various sources, identifying vulnerabilities, indicators and warnings, performing intelligence analysis through the application of analytic tools and techniques, providing government client with analysis of targeting options, and provide analytic tradecraft mentorship and training as needed.
  • Actively analyzes and manages projects, capabilities, policies and procedures.
  • Analyzes collection-related information to guide tasking, identify problems, and assist with collection management; and recognizes essential elements of information to enable endpoint opportunities.
  • Conduct SIGINT disciplines of collection, target development, and tasking.
  • Understand logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.
  • Shift-work may be required.

Digital Network Exploitation Analyst 1

Minimum Requirements:

  • Must be a U.S citizen.
  • Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.
  • Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.) preferred. 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.
  • Minimum 2 years of relevant experience in computer or information systems design/development/analysis, engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
  • Requires understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.
  • Possess a working knowledge of the principles and methods used to identify, collect, analyze process and disseminate information in accordance with established requirements and priorities.
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered toward the relevant experience requirement.

Digital Network Exploitation Analyst 2

Minimum Requirements:

  • Must be a U.S citizen.
  • Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.
  • Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.) preferred. 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.
  • Minimum 11 years of relevant experience in computer or information systems design/development/analysis, engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
  • Possess a working knowledge of the principles and methods used to identify, collect, analyze process and disseminate information in accordance with established requirements and priorities.
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered toward the relevant experience requirement.

Digital Network Exploitation Analyst 3

Minimum Requirements:

  • Must be a U.S citizen.
  • Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.
  • Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.) preferred. 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.
  • Minimum 8 years of relevant experience in computer or information systems design/development/analysis, engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
  • Possess a working knowledge of the principles and methods used to identify, collect, analyze process and disseminate information in accordance with established requirements and priorities.
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered toward the relevant experience requirement.

Digital Network Exploitation Analyst 4

Minimum Requirements:

  • Must be a U.S citizen.
  • Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.
  • Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.) preferred. 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.
  • Minimum 11 years of relevant experience in computer or information systems design/development/analysis, engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
  • Possess a working knowledge of the principles and methods used to identify, collect, analyze process and disseminate information in accordance with established requirements and priorities.
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered toward the relevant experience requirement

#FFX

       

Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran’s status, ancestry, sexual orientation, gender identity, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal EEO laws and supplemental language at EEO including Disability/Protected Veterans and Labor Laws Posters.

Top Skills

Computer Forensics
Computer Science
Cyber Security
Engineering
Information Systems
It
Mathematics
Networking And Telecommunications
Physics
Telecommunications
Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: Germantown, MD
18,261 Employees
On-site Workplace

What We Do

Amentum is a premier global technical and engineering services partner supporting critical programs of national significance across defense, security, intelligence, energy, and environment. We draw from a century-old heritage of operational excellence, mission focus, and successful execution underpinned by a strong culture of safety and ethics. Headquartered in Germantown, Md., we employ more than 20,000 people in 48 states and 28 foreign countries and territories. Visit us at amentum.com to explore how we deliver excellence for our customers’ most vital missions.

Similar Jobs

CrowdStrike Logo CrowdStrike

Threat Analyst, Machine Learning (Remote, East/Central)

Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Remote
Hybrid
38 Locations
10000 Employees
100K-150K Annually

BAE Systems, Inc. Logo BAE Systems, Inc.

SOF Communication Systems Technician II / III

Aerospace • Hardware • Information Technology • Security • Software • Cybersecurity • Defense
Hybrid
St. Inigoes, MD, USA
40000 Employees
30-32

CDW Logo CDW

Linux Systems Administrator - Full Scope Poly

Artificial Intelligence • eCommerce • Information Technology • Internet of Things • Automation
Hybrid
Crofton, MD, USA
15100 Employees

BAE Systems, Inc. Logo BAE Systems, Inc.

Information Systems Security Officer (ISSO)

Aerospace • Hardware • Information Technology • Security • Software • Cybersecurity • Defense
Hybrid
Annapolis Junction, MD, USA
40000 Employees
127K-215K Annually

Similar Companies Hiring

Invoice Home Thumbnail
Software • SEO • Mobile • Information Technology • Fintech • Financial Services • Cybersecurity
Austin, TX
20 Employees
MacPaw Thumbnail
Software • Security • Information Technology • Data Privacy • Cybersecurity • App development
Cambridge, MA
550 Employees
Silverfort Thumbnail
Security • Sales • Information Technology • Cybersecurity • Automation
GB
442 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account