Geospatial And Cloud Analytics Inc
Exploitation Analyst
Geospatial And Cloud Analytics Inc, Norfolk, Virginia, United States, 23500
The Exploitation Analyst serves as a
subject matter expert (SME) in cyberspace operations , responsible for developing and overseeing detailed cyber Operational Test & Evaluation (OT&E) plans executed by OPTEVFOR Red Teams and other supporting organizations. The role supports cyber survivability assessments by identifying system access points, critical components, and adversarial techniques to develop executable test objectives. The Exploitation Analyst identifies cyber capability gaps, evaluates cyber test requirements for systems under test, and researches and coordinates with DoD organizations, academia, private sector partners, and defense contractors to identify appropriate cyber capabilities and tools. Proposed test requirements are forwarded to the Government for review and approval. All duties are performed under the supervision of the
OPTEVFOR 01D Future Operations Officer . Personnel in this role may support multiple programs concurrently based on planning scope and execution schedules. The Exploitation Analyst also supports the development and maintenance of OPTEVFOR cyber survivability planning templates, documentation, and training curricula, and serves as an instructor for associated courses. Participation in OT&E working groups, technical exchanges, and meetings is required. All personnel must sign the
OPTEVFOR Red Team Code of Conduct . Security Clearance Requirement
Eligibility for
Top Secret / Sensitive Compartmented Information (TS/SCI) . Qualifications
Bachelor’s degree in
Computer Science, Cybersecurity, or a related technical discipline
OR
a minimum of
five (5) years
of experience supporting
DoD defensive or offensive cyberspace operations planning or exploitation analysis Demonstrated proficiency decomposing
complex computer systems and network architectures
in support of exploitation analysis Proficiency with
Microsoft Office applications , including
Visio, Project, Excel, and PowerPoint Proven ability to apply
quality assurance and quality control (QA/QC)
processes to analytical products prior to Government delivery Excellent
written and verbal communication skills , including experience briefing
senior leadership (O-6 / GS-15 or above) Key Responsibilities
Headquarters (HQ) Support
Serve as an OPTEVFOR 01D Exploitation Analyst supporting
cyber survivability policy and process oversight
for warfare divisions Become proficient in and adhere to OPTEVFOR cyber OT&E
CONOPS, SOPs, policies, and guidance Support sustainment, updates, and instruction of the
OPTEVFOR Cyber Survivability Test Planning Course Attend OPTEVFOR-required meetings in support of OT&E activities Identify and communicate risks, issues, and challenges to the
01D Future Operations Officer
in a timely manner Participate in development and maintenance of
01D SOPs
and OPTEVFOR cyber test planning documentation, including participation in the
Configuration Control Board (CCB)
process Pre-Test Planning
Support development of overall
cyber OT&E strategy and test scope
for acquisition programs Review and assess
Test and Evaluation Master Plans (TEMP) , Integrated Evaluation Frameworks (IEF), test plans, and related planning documents to ensure compliance with OPTEVFOR policy and adequacy of cyber test strategies Adjudicate stakeholder comments related to cyber OT&E planning documentation Support program-specific and non-program-specific
T&E Integrated Product Teams (IPTs) , cyber tabletop exercises, technical exchange meetings, and other planning events as assigned Test Planning
Develop
cyber survivability test plans
in accordance with OPTEVFOR Cyber OT&E procedures and approved templates Coordinate with warfare divisions and red team operators to ensure:
Test objectives are comprehensive and executable Data collection requirements are clearly defined Cyber capabilities are identified, resourced, and integrated prior to test plan approval
Participate in test planning visits and site surveys supporting cyber OT&E events Test Execution
Lead preparation for test execution, including:
Participation in site pre-test coordination visits and delivery of site in-briefs Conduct of
Pre-Execution Briefs
to OPTEVFOR 01D leadership Preparation and delivery of required data libraries to test sites Verification that all
deconfliction requirements
are met in accordance with
JFHQ-DoDIN
and
Navy Cyber Defense Operations Command
guidance
Lead execution of assigned cyber OT&E events, including cooperative vulnerability penetration assessments and adversarial assessments Coordinate execution with
OTDs, site personnel, program office SMEs, and supporting red teams Ensure tests are conducted safely and in compliance with OPTEVFOR and DoD policies Follow all
JFHQ-DoDIN deconfliction procedures Verify accuracy and completeness of collected data Conduct daily hotwashes and submit
daily summary reports
to the OTD and OPTEVFOR 01D leadership Ensure all test objectives are fully executed and documented Post-Test Activities
Support post-test processes to ensure
traceability between test objectives, collected data, and deliverables Coordinate with the OTD to schedule post-test meetings Participate in post-test forums, including:
Data uploads and scoring boards OPTEVFOR 01D Review Board Critical Operational Issue (COI) Evaluation Working Group (CEWG) System Evaluation Review Board (SERB) Executive SERB (E-SERB)
Lead development of final test report products, ensuring technical accuracy and compliance with OPTEVFOR Cyber OT&E procedures and templates, including:
Drafting
Data Analysis Summaries and Results Enclosures Reviewing Blue/Gold Sheets prepared by red team operators
DCWF Knowledge, Skills, Abilities, and Tasks (KSATs)
Knowledge
Computer system architectures and physical components (CPUs, NICs, storage, peripherals) Network addressing, routing, and protocols (IP, CIDR, TCP/UDP, SMTP) Common networking devices and configurations (routers, switches, hubs) Operating systems concepts (Linux, Unix) Communications media and technologies (wired, wireless, satellite) Cyber attack methods and techniques (e.g., DDoS, spoofing, brute force) Malicious activity lifecycle concepts (footprinting, scanning, enumeration) Internet and routing protocols and application behaviors Skills & Abilities
Develop comprehensive exploitation strategies identifying technical and operational vulnerabilities Identify, describe, and assess system and network vulnerabilities Analyze complex systems to determine exploitable attack surfaces Collaborate effectively across Government, contractor, and red team stakeholders Communicate complex technical information clearly through written, verbal, and visual means Apply QA/QC rigor to analytical products supporting senior-level decision making
#J-18808-Ljbffr
subject matter expert (SME) in cyberspace operations , responsible for developing and overseeing detailed cyber Operational Test & Evaluation (OT&E) plans executed by OPTEVFOR Red Teams and other supporting organizations. The role supports cyber survivability assessments by identifying system access points, critical components, and adversarial techniques to develop executable test objectives. The Exploitation Analyst identifies cyber capability gaps, evaluates cyber test requirements for systems under test, and researches and coordinates with DoD organizations, academia, private sector partners, and defense contractors to identify appropriate cyber capabilities and tools. Proposed test requirements are forwarded to the Government for review and approval. All duties are performed under the supervision of the
OPTEVFOR 01D Future Operations Officer . Personnel in this role may support multiple programs concurrently based on planning scope and execution schedules. The Exploitation Analyst also supports the development and maintenance of OPTEVFOR cyber survivability planning templates, documentation, and training curricula, and serves as an instructor for associated courses. Participation in OT&E working groups, technical exchanges, and meetings is required. All personnel must sign the
OPTEVFOR Red Team Code of Conduct . Security Clearance Requirement
Eligibility for
Top Secret / Sensitive Compartmented Information (TS/SCI) . Qualifications
Bachelor’s degree in
Computer Science, Cybersecurity, or a related technical discipline
OR
a minimum of
five (5) years
of experience supporting
DoD defensive or offensive cyberspace operations planning or exploitation analysis Demonstrated proficiency decomposing
complex computer systems and network architectures
in support of exploitation analysis Proficiency with
Microsoft Office applications , including
Visio, Project, Excel, and PowerPoint Proven ability to apply
quality assurance and quality control (QA/QC)
processes to analytical products prior to Government delivery Excellent
written and verbal communication skills , including experience briefing
senior leadership (O-6 / GS-15 or above) Key Responsibilities
Headquarters (HQ) Support
Serve as an OPTEVFOR 01D Exploitation Analyst supporting
cyber survivability policy and process oversight
for warfare divisions Become proficient in and adhere to OPTEVFOR cyber OT&E
CONOPS, SOPs, policies, and guidance Support sustainment, updates, and instruction of the
OPTEVFOR Cyber Survivability Test Planning Course Attend OPTEVFOR-required meetings in support of OT&E activities Identify and communicate risks, issues, and challenges to the
01D Future Operations Officer
in a timely manner Participate in development and maintenance of
01D SOPs
and OPTEVFOR cyber test planning documentation, including participation in the
Configuration Control Board (CCB)
process Pre-Test Planning
Support development of overall
cyber OT&E strategy and test scope
for acquisition programs Review and assess
Test and Evaluation Master Plans (TEMP) , Integrated Evaluation Frameworks (IEF), test plans, and related planning documents to ensure compliance with OPTEVFOR policy and adequacy of cyber test strategies Adjudicate stakeholder comments related to cyber OT&E planning documentation Support program-specific and non-program-specific
T&E Integrated Product Teams (IPTs) , cyber tabletop exercises, technical exchange meetings, and other planning events as assigned Test Planning
Develop
cyber survivability test plans
in accordance with OPTEVFOR Cyber OT&E procedures and approved templates Coordinate with warfare divisions and red team operators to ensure:
Test objectives are comprehensive and executable Data collection requirements are clearly defined Cyber capabilities are identified, resourced, and integrated prior to test plan approval
Participate in test planning visits and site surveys supporting cyber OT&E events Test Execution
Lead preparation for test execution, including:
Participation in site pre-test coordination visits and delivery of site in-briefs Conduct of
Pre-Execution Briefs
to OPTEVFOR 01D leadership Preparation and delivery of required data libraries to test sites Verification that all
deconfliction requirements
are met in accordance with
JFHQ-DoDIN
and
Navy Cyber Defense Operations Command
guidance
Lead execution of assigned cyber OT&E events, including cooperative vulnerability penetration assessments and adversarial assessments Coordinate execution with
OTDs, site personnel, program office SMEs, and supporting red teams Ensure tests are conducted safely and in compliance with OPTEVFOR and DoD policies Follow all
JFHQ-DoDIN deconfliction procedures Verify accuracy and completeness of collected data Conduct daily hotwashes and submit
daily summary reports
to the OTD and OPTEVFOR 01D leadership Ensure all test objectives are fully executed and documented Post-Test Activities
Support post-test processes to ensure
traceability between test objectives, collected data, and deliverables Coordinate with the OTD to schedule post-test meetings Participate in post-test forums, including:
Data uploads and scoring boards OPTEVFOR 01D Review Board Critical Operational Issue (COI) Evaluation Working Group (CEWG) System Evaluation Review Board (SERB) Executive SERB (E-SERB)
Lead development of final test report products, ensuring technical accuracy and compliance with OPTEVFOR Cyber OT&E procedures and templates, including:
Drafting
Data Analysis Summaries and Results Enclosures Reviewing Blue/Gold Sheets prepared by red team operators
DCWF Knowledge, Skills, Abilities, and Tasks (KSATs)
Knowledge
Computer system architectures and physical components (CPUs, NICs, storage, peripherals) Network addressing, routing, and protocols (IP, CIDR, TCP/UDP, SMTP) Common networking devices and configurations (routers, switches, hubs) Operating systems concepts (Linux, Unix) Communications media and technologies (wired, wireless, satellite) Cyber attack methods and techniques (e.g., DDoS, spoofing, brute force) Malicious activity lifecycle concepts (footprinting, scanning, enumeration) Internet and routing protocols and application behaviors Skills & Abilities
Develop comprehensive exploitation strategies identifying technical and operational vulnerabilities Identify, describe, and assess system and network vulnerabilities Analyze complex systems to determine exploitable attack surfaces Collaborate effectively across Government, contractor, and red team stakeholders Communicate complex technical information clearly through written, verbal, and visual means Apply QA/QC rigor to analytical products supporting senior-level decision making
#J-18808-Ljbffr