user avatar

Data Exploiter (TS/SCI with Poly Required)

GCI, Inc

Today
Top Secret/SCI
Unspecified
Unspecified
IT - Database
Chantilly, VA (On-Site/Office)

GCI embodies excellence, integrity and professionalism. The employees supporting our customers deliver unique, high-value mission solutions while effectively leverage the technological expertise of our valued workforce to meet critical mission requirements in the areas of Data Analytics and Software Development, Engineering, Targeting and Analysis, Operations, Training, and Cyber Operations. We maximize opportunities for success by building and maintaining trusted and reliable partnerships with our customers and industry.

At GCI, we solve the hard problems. As a Data Exploiter, a typical day will include the following duties:

JOB DESCRIPTION

A qualified Data Exploiter reviews, manipulates, triages, and analyzes large datasets. Candidate is responsible for supporting operational and analytical requirements. Activities include detailed log analysis, network traffic review and vulnerability risk assessment. The individual will be expected to conduct assessments of software tools and systems to identify vulnerabilities, and work with internal and external technical stakeholders to identify solutions to enrich analysis. Able to follow the entire targeting life cycle by engaging in data exploitation of requirements collection, data analysis, summary and documentation, and actionable information dissemination.

KEY RESPONSIBILITIES
  • Provide data exploitation and targeting support to the customer.
  • Use a variety of tools and methods to extract information of foreign intelligence, counterintelligence and targeting value from digital data.
  • Create a range of products that inform operations, drive targeting and collection, contribute to intelligence products, and support multiple customer needs.
  • Work with a team to analyze existing software applications and tools, and recommend new technologies and methodologies to improve team performance.
  • Write and update technical documentation such as user manuals, system documentation, training materials, processes and procedures, technical reports and targeting leads.
  • Collaborate cross-functionally with data scientists, engineers, developers, targeters, and analysts.
  • Analyze intrusion artifacts to identify mitigation approaches for potential network defense
  • Provide recommendations for continuous improvement.
  • Work alongside other team members to sustain and advance our organization's capabilities.


EDUCATION AND EXPERIENCE
  • Bachelor's degree in Computer Science, Information Technology, or other related discipline, or
  • Equivalent combination of education, technical certifications, training, and work/military

experience.

REQUIRED QUALIFICATIONS
  • Demonstrated experience conducting in-depth targeting research/analysis on priorities and diverse datasets
  • Demonstrated experience and ability to communicate complex information and concepts to an audience of varying levels of technical experience.
  • Demonstrated experience and ability to sort through, catalog and analyze multiple forms of data using an array of tools and methods to achieve objectives
  • Demonstrated experience in utilizing technical targeting tools
  • Experience reviewing and assessing network traffic and knowledge of the OSI Layers
  • Ability to sift through large amounts of unstructured data for key data points (metadata and artifacts)
  • Knowledge of incident response, containment, and mitigation
  • Knowledge of common cyber-attack methods
  • Demonstrated experience conducting detailed log analysis and system monitoring to understand system status, detect system breaches, and identify other system anomalies
  • Demonstrated experience performing vulnerability identification, risk analysis, and remediation
  • Ability to triage, review, identify, and correlate items of interest from numerous all source
  • datasets
  • Ability to evaluate worldwide security events to assess system impact and/or risk (e.g., zero day exploits, hardware failures, and/or cyber-attacks)
  • Ability to sift through large amounts of unstructured data for key data points (i.e., metadata and artifacts)
  • Identify and document information that can fill critical gaps
  • Create new methodologies / algorithms for data analysis and correlation
  • Create entity / object profiles and derived data sets that enable future opportunities and
  • analytical efforts
  • Prepare a range of tailored products that embody and explain findings
  • Experience with technical collection abilities


DESIRED QUALIFICATIONS
  • Python Scripting
  • Strong understanding of VPNs, VLANs, and TCP/IP
  • Understanding of Linux operating systems
  • Ability to working independently with minimal supervision
  • Experience conducting network traffic analysis
  • Understanding of forensic tools and applications


Salary Range $160,000-$224,764

Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
group id: 90872399
job ad image
Find GCI, Inc on Social Media
Network Employers
user avatar
About Us
Vision: To be a premier provider of mission critical solutions and services to our customers. Our Mission: We deliver unique, high-value mission solutions to our customers. We effectively leverage the technological expertise of our valued workforce to meet critical mission requirements in the areas of Data Analytics and Software Development, Engineering, Targeting and Analysis, Operations, Training, and Cyber Operations. We maximize opportunities for success by building and maintaining trusted and reliable partnerships with our customers and industry.
job ad2 image

GCI, Inc Jobs


Job Category
IT - Database
Clearance Level
Top Secret/SCI
Employer
GCI, Inc