"Alerted.org

Job Title, Industry, Employer
City & State or Zip Code
20 mi
  • 0 mi
  • 5 mi
  • 10 mi
  • 20 mi
  • 50 mi
  • 100 mi
Advanced Search

Advanced Search

Cancel
Remove
+ Add search criteria
City & State or Zip Code
20 mi
  • 0 mi
  • 5 mi
  • 10 mi
  • 20 mi
  • 50 mi
  • 100 mi
Related to

  • Exploitation Analysts 1-4 (EA)

    Amentum (Fort Meade, MD)



    Apply Now

    Amentum is seeking **Exploitation Analysts 1-4 (EA)** to use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur.

    Essential Duties:

    + Primary mission is exploitation. Create exploitation plans and make operational adjustments using understanding of network defenses and vulnerabilities.

    + Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems. Work may span the gamut of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that support it all.

    + Develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security.

    + Work with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.

    + Apply analytical thinking t to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights.

    + Distill, document, contextualize and share your findings with teammates, stakeholders, and intelligence consumers.

    + Utilize network or system administration.

     

    Exploitation Analysts 1

    Minimum Requirements:

    + Must be a U.S citizen.

    + Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.

    + Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.). 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.

    + Minimum 2 years of relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.

    + Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered toward relevant experience requirement.

    + Network+, Security+ , Certified Ethical Hacker, Cisco Certified Network Associate or similar certifications preferred.

     

    Exploitation Analysts 2

    Minimum Requirements:

    + Must be a U.S citizen.

    + Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.

    + Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.). 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.

    + Minimum 5 years of relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.

    + Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered toward relevant experience requirement.

    + Network+, Security+ , Certified Ethical Hacker, Cisco Certified Network Associate or similar certifications preferred.

     

    Exploitation Analysts 3

    Minimum Requirements:

    + Must be a U.S citizen.

    + Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.

    + Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.). 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.

    + Minimum 5 years of relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.

    + Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered toward relevant experience requirement.

    + Network+, Security+ , Certified Ethical Hacker, Cisco Certified Network Associate or similar certifications preferred.

     

    Exploitation Analysts 4

    Minimum Requirements:

    + Must be a U.S citizen.

    + Must possess a current Top Secret (TS) clearance with SCI eligibility and a polygraph.

    + Degree in a technical field (e.g., Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems, Networking and Telecommunications, etc.). 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associates degree.

    + Minimum 11 years of relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.

    + Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered toward relevant experience requirement.

    + Network+, Security+ , Certified Ethical Hacker, Cisco Certified Network Associate or similar certifications preferred.

    \#FFX

    Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran’s status, ancestry, sexual orientation, gender identity, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal EEO laws and supplemental language at EEO including Disability/Protected Veterans (https://www.dol.gov/agencies/ofccp/posters) and Labor Laws Posters (https://protect-us.mimecast.com/s/MI5TC2kqOqsOBPMVfnZ32U) .

     


    Apply Now



Recent Searches

[X] Clear History

Recent Jobs

  • Exploitation Analysts 1-4 (EA)
    Amentum (Fort Meade, MD)
[X] Clear History

Account Login

Cancel
 
Forgot your password?

Not a member? Sign up

Sign Up

Cancel
 

Already have an account? Log in
Forgot your password?

Forgot your password?

Cancel
 
Enter the email associated with your account.

Already have an account? Sign in
Not a member? Sign up

© 2025 Alerted.org