The Data Exploitation Analyst performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
This position requires significant cyber technical capabilities as well as intelligence analysis skills (analytical methodology and practice, writing and production, briefing, identification of knowledge gaps, etc.). The team member must be able to coordinate with multiple external groups and to excel on individual projects as well as participate in joint efforts.
TS/SCI with Polygraph
A bachelor's degree in Computer Science, Engineering or Information Technology and a total of 8 years of experience
3 years' Exploitation experience
2 additional years of related experience in computer incident response, network forensics, computer forensics or computer security in lieu of a degree
3 years of experience in technical analysis, digital forensics, technical targeting, or similar relevant technical discipline
Relevant commercial or military experience and another degree may be acceptable
Hands-on experience using commercially available data exploitation and visualization tools for analysis (e.g. MS Excel, Tableau, Wireshark, X-Ways, Encase)
Experience analyzing data sets (both small and large) for trends and patterns
Experience producing informational, contextual and/or intelligence products that embody and explain findings for a variety of audiences.
Familiarity with field HUMINT, cyber collection/threat mission or prior experience with in-depth knowledge of national intelligence agencies, law enforcement or DoD cyber components.
Familiarity with cable writing styles
Strong briefing and writing skills are a must as well as the ability to work well with teams or individually with minimal supervision
Demonstrate regional and/or functional expertise or a working knowledge of geographic regions of interest to the United States, including the Middle East
Knowledge of computing processing platforms (e.g. computers. mobile, internet of things) preferred
Knowledge of Internet Request for Comments (RFC) standards desired
Knowledge of mobile technologies to include cellular networks (WiFi, Bluetooth, etc.) preferred
Experience working cyber security, such as penetration testing desired
About Our Work
We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
GDIT does not have a vaccination mandate applicable to all employees. To protect the health and safety of its employees and to comply with customer requirements, however, GDIT may require employees in certain positions to be fully vaccinated against COVID-19. Vaccination requirements will depend on the status of the federal contractor mandate and customer site requirements.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.