Clearance Jobs
Data Exploiter (TS/SCI with Poly Required)
Clearance Jobs, Chantilly, Virginia, United States, 20153
divh2Data Exploiter/h2pGCI embodies excellence, integrity and professionalism. The employees supporting our customers deliver unique, high-value mission solutions while effectively leverage the technological expertise of our valued workforce to meet critical mission requirements in the areas of Data Analytics and Software Development, Engineering, Targeting and Analysis, Operations, Training, and Cyber Operations. We maximize opportunities for success by building and maintaining trusted and reliable partnerships with our customers and industry. At GCI, we solve the hard problems./ppA qualified Data Exploiter reviews, manipulates, triages, and analyzes large datasets. Candidate is responsible for supporting operational and analytical requirements. Activities include detailed log analysis, network traffic monitoring, and vulnerability risk assessment. The individual will be expected to conduct assessments of software tools and systems to identify vulnerabilities, and work with internal and external technical stakeholders to identify solutions to enrich analysis. Able to follow the entire targeting life cycle by engaging in data exploitation of requirements collection, data analysis, summary and documentation, and actionable information dissemination. Able to identify, triage and exploit data collections./ph3Required Qualifications/h3ulliExperience conducting network traffic analysis./liliPrepare a range of tailored products that embody and explain findings/liliAbility to sift through large amounts of unstructured data for key data points (i.e., metadata and artifacts)./liliDemonstrated knowledge of incident response, containment, and mitigation/liliKnowledge of common cyber-attack methods./liliDemonstrated experience conducting detailed log analysis and system monitoring to understand system status, detect system breaches, and identify other system anomalies./liliDemonstrated experience performing vulnerability identification, risk analysis, and remediation./liliAbility to triage, review, identify, and correlate items of interest from numerous all source datasets./liliAbility to evaluate worldwide security events to assess system impact and/or risk (e.g., zero day exploits, hardware failures, and/or cyber-attacks)./liliAbility to identify and document information that can fill critical gaps./liliCreate new methodologies / algorithms for data analysis and correlation./liliCreate entity / object profiles and derived data sets that enable future opportunities and analytical efforts./liliExperience with technical collection abilities./li/ulh3Desired Qualifications/h3ulliExperience with scripting to exploit large data sets/liliStrong understanding of VPNs, VLANs, and TCP/IP./liliExperience with Linux operating systems./liliExperience with OS hardening using tools such as CIS-CAT./liliAbility to work independently with minimal supervision./liliExperience with navigating an enterprise security accreditation process./liliDemonstrated experience and understanding of network monitoring tools (e.g Splunk, WSUS, Snare, Wireshark, and Solarwinds)./liliTechnical targeting experience./liliRussian Language skills or demonstrated knowledge of the EE AOR/li/ulh3Required Education and Experience/h3ulliBachelors degree in Computer Science, Information Technology, or other related discipline, or equivalent combination of education, technical certifications, training, and work/military experience./li/ulh3Key Responsibilities/h3ulliProvide data exploitation support to the customer./liliAssist with attribution efforts related to cyber activity./liliUse a variety of tools and methods to extract information of foreign intelligence, counterintelligence and targeting value from digital data./liliCreate a range of products that inform operations, drive targeting and collection, contribute to intelligence products, and support multiple customer needs./liliWork with a team to analyze existing software applications and tools, and recommend new technologies and methodologies to improve team performance./liliWrite and update technical documentation such as user manuals, system documentation, training materials, processes and procedures./liliCollaborate cross-functionally with data scientists, engineers, developers, targeters, and analysts./liliProvide recommendations for continuous improvement./liliWork alongside other team members to sustain and advance our organizations capabilities./li/ulpSalary Range $134,596-$224,764 *A candidate must be a US Citizen and requires an active/current TS/SCI with Polygraph clearance. Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans/p/div