Data Exploiter (TS/SCI with Poly Required)
USD 134K-224K Senior-level Full Time Found 17d ago
Tasks
- Collaborate with stakeholders and team
- Conduct vulnerability assessments
- Contribute to intelligence and attribution efforts
- Create methodologies and profiles
- Document findings and procedures
- Generate analytical products
- Maintain technical documentation
- Perform network traffic monitoring
- Recommend new technologies
- Review and analyze large datasets
- Support operational requirements
- Triage and exploit data collections
- Work independently and cross-functionally
Perks/Benefits
- N/A
Skills/Tech-stack
Algorithm creation | Artifact analysis | Attack techniques | Cyber Defense | Cyber attack | Cyber attack techniques | Cybersecurity | Data Analysis | Data Exploitation | Data collection | Data correlation | Digital forensics | Entity profiling | Information security | Linux | Log Analysis | Malware Detection | Metadata analysis | Methodology Development | Monitoring Tools | Network Monitoring | Network Traffic | Network Traffic Analysis | Network monitoring tools | OS Hardening | Risk Analysis | Scientific Data | Scientific data collection | Scripting | Security assessment | Snare | SolarWinds | Splunk | TCP/IP | Technical targeting | Threat Intelligence | Traffic analysis | VLANs | VPNs | Vulnerability Assessment | Wireshark
Education
N/A
Roles
Related jobs
- No jobs found.