Digital Network Exploitation Analyst 1-4 (DNEA)

Posted 7 Days Ago
Be an Early Applicant
Fort Meade, MD
Mid level
Security • Cybersecurity
The Role
The Digital Network Exploitation Analyst is responsible for performing technical analysis of metadata and content, evaluating intelligence value of targets, conducting target research, and providing analytic mentorship. This role involves managing projects, understanding network topographies, and analyzing SIGINT disciplines related to collection and tasking.
Summary Generated by Built In

Amentum is seeking multiple Digital Network Exploitation Analyst 1-4 (DNEA) to perform technical analysis of metadata and content to ensure target continuity, to evaluate intelligence value of targets, and develop techniques to establish continued collection or gain additional target information.


Essential Duties:

  • The DNEA will blend traditional intelligence analysis with a technical understanding of communication infrastructures, physical and logical network topographies, protocols and applications, and trending technologies.
  • Conducting target research from various sources, identifying vulnerabilities, indicators and warnings, performing intelligence analysis through the application of analytic tools and techniques, providing government client with analysis of targeting options, and provide analytic tradecraft mentorship and training as needed.
  • Actively analyzes and manages projects, capabilities, policies and procedures.
  • Analyzes collection-related information to guide tasking, identify problems, and assist with collection management; and recognizes essential elements of information to enable endpoint opportunities.
  • Conduct SIGINT disciplines of collection, target development, and tasking.
  • Understand logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.
  • Shift-work may be required.

Digital Network Exploitation Analyst 1

Minimum Requirements:

  • Must be a U.S citizen.
  • Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.
  • Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.) preferred. 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.
  • Minimum 2 years of relevant experience in computer or information systems design/development/analysis, engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
  • Requires understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.
  • Possess a working knowledge of the principles and methods used to identify, collect, analyze process and disseminate information in accordance with established requirements and priorities.
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered toward the relevant experience requirement.

Digital Network Exploitation Analyst 2

Minimum Requirements:

  • Must be a U.S citizen.
  • Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.
  • Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.) preferred. 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.
  • Minimum 11 years of relevant experience in computer or information systems design/development/analysis, engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
  • Possess a working knowledge of the principles and methods used to identify, collect, analyze process and disseminate information in accordance with established requirements and priorities.
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered toward the relevant experience requirement.

Digital Network Exploitation Analyst 3

Minimum Requirements:

  • Must be a U.S citizen.
  • Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.
  • Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.) preferred. 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.
  • Minimum 8 years of relevant experience in computer or information systems design/development/analysis, engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
  • Possess a working knowledge of the principles and methods used to identify, collect, analyze process and disseminate information in accordance with established requirements and priorities.
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered toward the relevant experience requirement.

Digital Network Exploitation Analyst 4

Minimum Requirements:

  • Must be a U.S citizen.
  • Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.
  • Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.) preferred. 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.
  • Minimum 11 years of relevant experience in computer or information systems design/development/analysis, engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
  • Possess a working knowledge of the principles and methods used to identify, collect, analyze process and disseminate information in accordance with established requirements and priorities.
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered toward the relevant experience requirement

Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran’s status, ancestry, sexual orientation, gender identity, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal EEO laws and supplemental language at EEO including Disability/Protected Veterans and Labor Laws Posters.

Top Skills

Computer Forensics
Computer Science
Cyber Security
Engineering
Information Systems
It
Mathematics
Networking
Physics
Telecommunications
The Company
HQ: Germantown, MD
18,261 Employees
On-site Workplace

What We Do

Amentum is a premier global technical and engineering services partner supporting critical programs of national significance across defense, security, intelligence, energy, and environment. We draw from a century-old heritage of operational excellence, mission focus, and successful execution underpinned by a strong culture of safety and ethics. Headquartered in Germantown, Md., we employ more than 20,000 people in 48 states and 28 foreign countries and territories. Visit us at amentum.com to explore how we deliver excellence for our customers’ most vital missions.

Similar Jobs

Freedom Technology Solutions Logo Freedom Technology Solutions

Digital Network Exploitation Analyst

Information Technology • Software • Consulting
Annapolis Junction, MD, USA
138 Employees

BAE Systems, Inc. Logo BAE Systems, Inc.

SIGINT Analyst - Level 3

Aerospace • Hardware • Information Technology • Security • Software • Cybersecurity • Defense
Hybrid
Fort Meade, MD, USA
40000 Employees
127K-215K Annually

BAE Systems, Inc. Logo BAE Systems, Inc.

SIGINT Analyst - Level 2

Aerospace • Hardware • Information Technology • Security • Software • Cybersecurity • Defense
Hybrid
Fort Meade, MD, USA
40000 Employees
112K-191K Annually

Ahold Delhaize USA Logo Ahold Delhaize USA

Analyst II Planning

AdTech • eCommerce • Food • Marketing Tech • Retail
Hyattsville, MD, USA
10000 Employees

Similar Companies Hiring

Coro Thumbnail
Software • Security • Information Technology • Data Privacy • Cybersecurity • Cloud • Artificial Intelligence
Chicago, IL
330 Employees
MacPaw Thumbnail
Software • Security • Information Technology • Data Privacy • Cybersecurity • App development
Cambridge, MA
550 Employees
Silverfort Thumbnail
Security • Sales • Information Technology • Cybersecurity • Automation
GB
357 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account