Full Time
Medical, Dental & Vision available
$140k - $250k Depending on Experience
Position Overview:
We are seeking a highly skilled and motivated Exploitation Analyst to join our client's team. The ideal candidate will possess a strong technical background and the ability to analyze and interpret complex data. As an Exploitation Analyst, you will be responsible for identifying, analyzing, and exploiting vulnerabilities in various systems and networks to support mission-critical objectives.
Key Responsibilities:
- Conduct in-depth analysis of network traffic, logs, and related data to identify vulnerabilities, threats, and potential exploits.
- Perform detailed assessments of systems, networks, and applications to identify weaknesses and provide recommendations for mitigation.
- Develop and implement strategies to exploit identified vulnerabilities and assess their impact on target systems.
- Collaborate with cross-functional teams, including cyber defense, intelligence, and operations, to support mission objectives.
- Analyze and interpret complex datasets to identify patterns, trends, and anomalies related to potential threats.
- Provide technical expertise in the development of exploitation tools, scripts, and methodologies.
- Document findings and create detailed reports to communicate analysis results to stakeholders.
- Stay current with emerging threats, vulnerabilities, and exploitation techniques, and apply this knowledge to ongoing operations.
- Support the development of countermeasures and defensive strategies to protect against future exploitation attempts.
- Conduct risk assessments to evaluate the potential impact of identified vulnerabilities and exploitation scenarios.
Qualifications:
- Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field. Equivalent experience may be considered in lieu of a degree.
- Minimum of 5 years of experience in cyber exploitation, penetration testing, or related fields.
- Proficiency in analyzing network traffic, logs, and other data sources to identify vulnerabilities and threats.
- Strong understanding of operating systems, network protocols, and cybersecurity principles.
- Experience with exploitation frameworks, tools, and techniques (e.g., Metasploit, Burp Suite, etc.).
- Ability to develop custom scripts and tools to facilitate exploitation and analysis tasks.
- Excellent analytical and problem-solving skills, with the ability to think creatively and adapt to evolving threats.
- Strong communication skills, with the ability to clearly convey complex technical concepts to non-technical audiences.
- Active TS/SCI clearance with Polygraph required.
Preferred Qualifications:
- Experience with advanced exploitation techniques, including zero-day vulnerabilities, buffer overflows, and privilege escalation.
- Certifications such as CEH, OSCP, CISSP, or similar are highly desirable.
- Knowledge of reverse engineering, malware analysis, or digital forensics.
- Experience with government or military cyber operations.
Why Join Us:
- Work on challenging and impactful projects that directly support national security.
- Collaborate with a team of experts in the field of cybersecurity and intelligence.
- Opportunities for continuous learning and professional development.
- Competitive salary and benefits package.
We do not discriminate in employment on the basis of race, color, religion, sex (including pregnancy and gender identity), national origin, political affiliation, sexual orientation, marital status, disability, genetic information, age, membership in an employee organization, retaliation, parental status, military service, or other non-merit factor.
https://www.staffed4u.com/