Job Requirements
Fort Meade, MD
Top Secret/SCI Polygraph Unspecified
Career Level not specified
Salary not specified
Join Premium to unlock estimated salaries
Job Description
What Impact You'll Have
We are currently seeking a Target Analyst Reporter (TAR) to join our team and support critical national security missions in the Fort Meade area.
What You'll be Owning
The ideal candidate will be responsible for producing intelligence products to customers by researching, analyzing, and reporting intelligence via appropriate reporting vehicles. Support Signals Intelligence, Information Assurance and Computer Network Operations. Prioritize, assess, evaluate and report information obtained from passive and active collection, network evaluation and analysis, and from collateral sources (ie MASINT, IMINT, HUMINT, Open Source, etc). Issue products that relay developments, trends, indications, warnings, and/or situational awareness regarding specific targets. Perform content quality control and/or product releaser functions for customer reports.
What You Must Have
#LI-SM1
We are currently seeking a Target Analyst Reporter (TAR) to join our team and support critical national security missions in the Fort Meade area.
What You'll be Owning
The ideal candidate will be responsible for producing intelligence products to customers by researching, analyzing, and reporting intelligence via appropriate reporting vehicles. Support Signals Intelligence, Information Assurance and Computer Network Operations. Prioritize, assess, evaluate and report information obtained from passive and active collection, network evaluation and analysis, and from collateral sources (ie MASINT, IMINT, HUMINT, Open Source, etc). Issue products that relay developments, trends, indications, warnings, and/or situational awareness regarding specific targets. Perform content quality control and/or product releaser functions for customer reports.
What You Must Have
- Analytic Editor Qualification/Experience
- Report Releaser Qualification/Experience
- Senior Reporting Authority Qualification/Experience
- At least seven (7) years experience in two (2) or more of the following (BS Degree in STEM will account for 4 years):
- Computer Network Exploitation
- Vulnerability Assessment
- Penetration Testing
- Incident Response
- Network and/or server forensics
- Cryptoanalytic work in military or intelligence community organization
- Cryptology in military or intelligence community organization
- At least one (1) year of experience in two (2) or more of the following:
- File Hashing and Fuzzy File Hashing (e.g., ssdeep, fciv, and md5deep)
- Commercial, open source or GOTS tools for intrusion detection (e.g., Snort, BroIDS)
- Packet capture/evaluation (e.g., tcpdump, ethereal/wireshark, NOSEHAIR)
- Network mapping/discovery (e.g.,nmap, TRICKLER)
- Industry standard system/network tools (e.g., netcat, netstat, traceroute, rpcinfo, nbtscan, snmpwalk, Sysinternals suite)
- At least two (2) years of experience in one (1) or more of the following:
- Development of exploits for Microsoft Windows operating systems
- Development of exploits for UNIX operating systems
- Development of exploits for personal computer device/mobile device operating systems (e.g., Android, Blackberry, iPhone, and iPad)
- Software Reverse Engineering to include use of code disassemblers (e.g., IDA Pro) and debugging unknown code (e.g. Ollydbg)
- Analysis of code in memory, including analysis of RAM snapshots, Windows crash dump files, and/or UNIX kernel dumps
- Implementing networks with IPv6 protocols
- Active TS SCI w/Polygraph
#LI-SM1
group id: 90883154