CAREERS

“Y’all are the first company I’ve actively thrown people at. Other places were -Eh, they pay you, just ignore the front office.” – Team Member

We pay $$$ for external referrals!

Submit your referral today!

Clear Results

DESCRIPTION:

Research adversarial threats posed to various systems, technologies, operations, or missions in all appropriate intelligence sources, analyze likelihood of threat, and contribute to profiling adversarial behavior, intent, and capabilities.

REQUIREMENTS:

QUALIFICATIONS:

LEVEL1:

LEVEL2:

LEVEL3:

Job Features

Job Category

Analytics, Documentation

DESCRIPTION: Research adversarial threats posed to various systems, technologies, operations, or missions in all appropriate intelligence sources, analyze likelihood of threat, and contribute to profi…

DESCRIPTION:

Prepare synthesized product for customers by researching, analyzing and reporting intelligence via appropriate reporting vehicles, in response to Intelligence Community (IC) requirements and in accordance with NSA missions of Signals Intelligence, Information Assurance and Computer Network Operations. Prioritize, assess, evaluate and report information obtained from passive and active collection, network evaluation and analysis, and from related collateral sources (for example IMINT, MASINT, HUMINT, open source and others as needed) for use or decision by Government personnel. Maintain awareness of internal and external customer needs. Collaborate with collectors and analysts to refine collection and reporting requirements. Share target-related information, and provide feedback to customers as appropriate. Issue appropriate products, which relay developments, trends, indications, warnings and/or situational awareness regarding specific targets, as well as countermeasures and courses of action, if applicable. Help develop databases or working aids on target activity to enhance and build target knowledge and improve collection to execute NSA and the Intelligence Community’s missions. Perform pre-release quality control functions.

REQUIREMENTS:

QUALIFICATIONS:

LEVEL1:

LEVEL2:

LEVEL3:

Job Features

Job Category

Analytics, Documentation

DESCRIPTION: Prepare synthesized product for customers by researching, analyzing and reporting intelligence via appropriate reporting vehicles, in response to Intelligence Community (IC) requirements …

DESCRIPTION:

Applies geographic information science in response to intelligence needs using SIGINT data collected from foreign systems. This includes the application of temporal and spatial thinking in interpreting SIGINT data in geographic context. Such interpretation requires skills, knowledge, and abilities drawn from multiple disciplines in order to undertake spatial data manipulation, spatial data analysis, spatial statistical analysis and spatial modeling. Have a fundamental knowledge of geospatial SIGINT data, analytical methods, and visualization, in addition to technical knowledge of target technologies. Use the various systems and tools that facilitate spatial analysis. Maintain or support maintenance of reference knowledge databases and dissemination of intelligence.

REQUIREMENTS:

QUALIFICATIONS:

LEVEL1:

LEVEL2:

LEVEL3:

Job Features

Job Category

Analytics, Documentation

DESCRIPTION: Applies geographic information science in response to intelligence needs using SIGINT data collected from foreign systems. This includes the application of temporal and spatial thinking i…

DESCRIPTION:

Identify policies and authorizations necessary to provide compliant targeting to networks and to satisfy specific collection requirements. Take an active role in developing, planning and coordinating the deployment of enterprise collection systems. Validate, coordinate, issue, adjust, and terminate targeting for NSA Access programs. Collaborate with collection architecture developers, signals analysts, network analysts, computer scientists, and external agencies to acquire, maintain and maximize access to global communications. Possess and maintain an awareness of policies, collection, processing and forwarding systems and architecture. Maintain requirements, targeting, resource, environmental, and tasking knowledge databases. Work with OPIs (Office of Primary Interest) to identify environmental changes that impact target communications and collection.

REQUIREMENTS:

QUALIFICATIONS:

LEVEL1:

LEVEL2:

LEVEL3:

Job Features

Job Category

Analytics, Documentation

DESCRIPTION: Identify policies and authorizations necessary to provide compliant targeting to networks and to satisfy specific collection requirements. Take an active role in developing, planning and …

DESCRIPTION:

Identify appropriate collection access points, methods, and/or plans necessary to exploit target networks and to satisfy specific collection requirements. Develop, plan, and coordinate the deployment of collection systems. Validate, coordinate, issue, adjust, and terminate collection tasking for NSA Collection programs. Collaborate internally and with external agencies to acquire, maintain and maximize access to global communications.

REQUIREMENTS:

QUALIFICATIONS:

LEVEL1:

LEVEL2:

LEVEL3:

Job Features

Job Category

Analytics, Documentation

DESCRIPTION: Identify appropriate collection access points, methods, and/or plans necessary to exploit target networks and to satisfy specific collection requirements. Develop, plan, and coordinate th…

DESCRIPTION:

The Target Digital Network Analyst conducts advanced analysis of collection and open-source data to ensure target continuity, to profile targets and their activities, and develop techniques to gain more target information. The TDNA has an understanding the principles and methods of exploiting foreign communications and communication systems to identify, collect, analyze process and disseminate information in accordance with established requirements and priorities; analyzes data for reportable intelligence information and building target profiles; maintains appropriate databases for targeting, tasking, and analysis; performs sustained target analysis and enhancement through the use of analytic techniques; analyzes data to identify new access development opportunities for follow-on collection requirements; performs research using open source and classified sources to develop comprehensive baseline profiles of designated target sets; identifies intelligence gaps and evaluating the intelligence gathered in order to either tailor current collection or enable new collection to close the gaps.

REQUIREMENTS:

Relevant experience requires aspects of Intelligence Analysis (e.g. target development, social network analysis, and metadata analysis.

QUALIFICATIONS:

Liberal Arts field (e.g., English, History, Communications, Languages and Cultures, International Relations, and Political Science) are preferred, but a degree in any field is acceptable

NOTE: Information Technology or Information Systems degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a CS major.

Job Features

Job Category

HOT JOB

DESCRIPTION: The Target Digital Network Analyst conducts advanced analysis of collection and open-source data to ensure target continuity, to profile targets and their activities, and develop techniqu…

DESCRIPTION

Exploitation analysts have many of the same skills of DNEAs, but their primary mission is more focused on exploitation. In addition to maintaining DNEA-level understanding of adversary networks, exploitation analysts have to understand network defenses and vulnerabilities to create exploitation plans and make operational adjustments.

REQUIREMENTS

Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.  Additionally, must have experience in network or system administration.  If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20-24 week courses will count as 6 months of experience, 10-14 weeks will count as 3 months of experience).

CERTIFICATIONS

18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associate’s degree (applicable to Level 1 – Level 4).

QUALIFICATIONS

Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)

Job Features

Job Category

Computer Science, Engineering, HOT JOB

DESCRIPTION Exploitation analysts have many of the same skills of DNEAs, but their primary mission is more focused on exploitation. In addition to maintaining DNEA-level understanding of adversary net…

DESCRIPTION

Digital Network Exploitation Analyst evaluates target opportunities and strategizes activities against particular networks using all source data to understand and map target networks and assist in developing detailed exploitation and operations plans. The Network Exploitation Analyst has a a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network; has a working knowledge of the principles and methods used to identify, collect, analyze process and disseminate information in accordance with established requirements and priorities; possesses an understanding of and experience in the SIGINT disciplines of collection, target development, and tasking; actively analyzes and manages projects, capabilities, policies and procedures; analyzes collection-related information to guide tasking, identify problems, and assist with collection management; and recognizes essential elements of information to enable endpoint opportunities.

REQUIREMENTS

Relevant experience must be in computer or information systems design/development/analysis.  In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.  Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will count as 6 months of experience).

CERTIFICATIONS

Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major.

QUALIFICATIONS

Degree in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics).

Job Features

Job Category

Computer Science, Engineering, HOT JOB, Math

DESCRIPTION Digital Network Exploitation Analyst evaluates target opportunities and strategizes activities against particular networks using all source data to understand and map target networks and a…

DESCRIPTION

Use information collected from a variety of sources to identify and analyze vulnerabilities, and report potential or actual events. CDNAs identify, analyze, map,  and/or protect against  vulnerabilities, intrusions and threats to computer network systems

REQUIREMENTS

Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.  Additionally, must have experience in network or system administration.  If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20-24 week courses will count as 6 months of experience, 10-14 weeks will count as 3 months of experience).

CERTIFICATIONS

18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associate’s degree (applicable to Level 1 – Level 4).

QUALIFICATIONS

Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)

Job Features

Job Category

Computer Science, HOT JOB

DESCRIPTION Use information collected from a variety of sources to identify and analyze vulnerabilities, and report potential or actual events. CDNAs identify, analyze, map,  and/or protect again…

Blog at WordPress.com.