Exploitation Analysts 1-4 (EA)

Reposted 12 Days Ago
Be an Early Applicant
Fort Meade, MD
In-Office
100K-190K Annually
Senior level
Security • Cybersecurity
The Role
The role requires identifying vulnerabilities, creating exploitation plans, and developing network defense strategies, with a focus on cyber security and system resilience.
Summary Generated by Built In

Amentum is seeking Exploitation Analysts 1-4 (EA) to use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur.  

Essential Duties:

  • Primary mission is exploitation. Create exploitation plans and make operational adjustments using understanding of network defenses and vulnerabilities.
  • Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems. Work may span the gamut of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that support it all.
  • Develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security.
  • Work with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.
  • Apply analytical thinking t to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights.
  • Distill, document, contextualize and share your findings with teammates, stakeholders, and intelligence consumers.
  • Utilize network or system administration. 

Exploitation Analysts 1

Minimum Requirements:

  • Must be a U.S citizen.
  • Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.
  • Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.). 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.
  • Minimum 2 years of relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered toward relevant experience requirement.
  • Network+, Security+ , Certified Ethical Hacker, Cisco Certified Network Associate or similar certifications preferred.

Exploitation Analysts 2

Minimum Requirements:

  • Must be a U.S citizen.
  • Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.
  • Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.). 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.
  • Minimum 5 years of relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered toward relevant experience requirement.
  • Network+, Security+ , Certified Ethical Hacker, Cisco Certified Network Associate or similar certifications preferred.

Exploitation Analysts 3

Minimum Requirements:

  • Must be a U.S citizen.
  • Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.
  • Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.). 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.
  • Minimum 5 years of relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered toward relevant experience requirement.
  • Network+, Security+ , Certified Ethical Hacker, Cisco Certified Network Associate or similar certifications preferred.

Exploitation Analysts 4

Minimum Requirements:

  • Must be a U.S citizen.
  • Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.
  • Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.). 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.
  • Minimum 11 years of relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered toward relevant experience requirement.
  • Network+, Security+ , Certified Ethical Hacker, Cisco Certified Network Associate or similar certifications preferred.

Compensation
The annual starting salary rate for this position is between $100,000-$ 190,000 annually depending on the level. Factors which may affect starting pay within this range may include geography/market, skills, 
education, experience and other qualifications of the successful candidate.

Benefits
Amentum offers the following benefits for this position, subject to applicable eligibility 
requirements: medical dental and vision insurance, 401(k) retirement plan, life insurance, long term and short term disability insurance, 15 days of paid time off, paid sick and safe time,
and parental leave offered as well.

#FFX

       

Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, sex, sexual orientation, pregnancy (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, ancestry, United States military or veteran status, color, religion, creed,  marital or domestic partner status, medical condition, genetic information, national origin, citizenship status, low-income status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal laws and supplemental language at Labor Laws Posters.

Top Skills

Cloud Security
Firewalls
Host System Logs
Internet Of Things Protocols
Intrusion Detection Systems
Network Traffic Logs
Networking Protocols
Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: Germantown, MD
18,261 Employees

What We Do

Amentum is a premier global technical and engineering services partner supporting critical programs of national significance across defense, security, intelligence, energy, and environment. We draw from a century-old heritage of operational excellence, mission focus, and successful execution underpinned by a strong culture of safety and ethics. Headquartered in Germantown, Md., we employ more than 20,000 people in 48 states and 28 foreign countries and territories. Visit us at amentum.com to explore how we deliver excellence for our customers’ most vital missions.

Similar Jobs

Ahold Delhaize USA Logo Ahold Delhaize USA

Manager Construction Projects

AdTech • eCommerce • Food • Marketing Tech • Retail
In-Office
Hyattsville, MD, USA
10000 Employees
106K-160K Annually

PwC Logo PwC

Managed Services - Test Data Management (Delphix) Analyst - Senior Associate

Artificial Intelligence • Professional Services • Business Intelligence • Consulting • Cybersecurity • Generative AI
Hybrid
45 Locations
370000 Employees
77K-202K Annually
Hybrid
5 Locations
213000 Employees
26-34 Hourly

Ahold Delhaize USA Logo Ahold Delhaize USA

Fixture Analyst

AdTech • eCommerce • Food • Marketing Tech • Retail
In-Office
Hyattsville, MD, USA
10000 Employees
63K-109K Annually

Similar Companies Hiring

Silverfort Thumbnail
Security • Sales • Information Technology • Cybersecurity • Automation
GB
507 Employees
Oso Thumbnail
Software • Security • Infrastructure as a Service (IaaS)
New York, New York
36 Employees
Credal.ai Thumbnail
Software • Security • Productivity • Machine Learning • Artificial Intelligence
Brooklyn, NY

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account