Data Exploiter (2023-0151) with Security Clearance Law Enforcement & Security - Bethesda, MD at Geebo

Data Exploiter (2023-0151) with Security Clearance

Acclaim Technical Services, founded in 2000, is a leading language, operations, and technology services company supporting a wide range of U.
SFederal agenciesWe are an Employee Stock Ownership Plan (ESOP) company, which is uncommon within our business sectorWe see this as a significant strength, and it shows:
ATS is consistently ranked as a top workplace among DC area firms and continues to growWe are actively hiring a Data Exploiter with TS/SCI clearance and polygraph to join our team working in Bethesda, MDA qualified Data Exploiter reviews, manipulates, triages, and analyzes large datasetsCandidate is responsible for supporting operational and analytical requirementsActivities include log analysis, network traffic monitoring, and vulnerability risk assessmentThe individual will be expected to conduct assessments of software tools and systems to identify vulnerabilities, and work with internal and external technical stakeholders to identify solutions to enrich analysisAble to follow the entire targeting life cycle by engaging in data exploitation of requirements collection, data analysis, summary and documentation, and actionable information disseminationKEY RESPONSIBILITIESo Provide data exploitation support to the customero Support Intelligence Report Writers with data exploitation assessmentso Use a variety of tools and methods to extract information of foreign intelligence, counterintelligence and targeting value from digital datao Create a range of products that inform operations, drive targeting and collection, contribute to intelligence products, and support multiple customer needso Work with a team to analyze existing software applications and tools, and recommend new technologies and methodologies to improve team performanceo Collaborate cross-functionally with data scientists, engineers, developers, targeters, and analystso Provide recommendations for continuous improvemento Work alongside other team members to sustain and advance our organization's capabilities RESPONSIBILITIESo Provide data exploitation support to the customer.
o Use a variety of tools and methods to extract information of foreign intelligence, counterintelligence and targeting value from digital data.
o Create a range of products that inform operations, drive targeting and collection, contribute to intelligence products, and support multiple customer needs.
o Work with a team to analyze existing software applications and tools, and recommend new technologies and methodologies to improve team performance.
o Write and update technical documentation such as user manuals, system documentation, training materials, processes and procedures.
o Collaborate cross-functionally with data scientists, engineers, developers, targeters, and analysts.
o Provide recommendations for continuous improvement.
o Work alongside other team members to sustain and advance our organization's capabilitiesREQUIRED EDUCATION & EXPERIENCEo Must possess an active TS/SCI clearance with polygrapho Bachelor's degree in Computer Science, Information Technology, or other related discipline, or equivalent combination of education, technical certifications, training, and work/military experienceo Experience conducting network traffic analysiso Prepare a range of tailored products that embody and explain findingso Ability to sift through large amounts of unstructured data for key data points (i.
e.
, metadata and artifacts)o Demonstrated knowledge of incident response, containment, and mitigationo Knowledge of common cyber-attack methodso Ability to triage, review, identify, and correlate items of interest from numerous all source datasetso Ability to evaluate worldwide security events to assess system impact and/or risk (e.
g.
, zero day exploits, hardware failures, and/or cyber-attacks)o Ability to identify and document information that can fill critical gapso Create new methodologies / algorithms for data analysis and correlationo Create entity/object profiles and derived data sets that enable future opportunitieso Experience with the customer's technical collection abilities PREFERRED SKILLSo Strong understanding of VPNs, VLANs, and TCP/IPo Demonstrated experience writing python scriptso Experience with Linux operating systemso Experience with OS hardening using tools such as CIS-CATo Ability to working independently with minimal supervisiono Experience with navigating an enterprise security accreditation processo Experience conducting network traffic analysiso Demonstrated experience conducting detailed log analysis and system monitoring to understand system status, detect system breaches, and identify other system anomalies Recommended Skills Network Security Intrusion Detection And Prevention Encryption Public Key Infrastructure Wireshark Microsoft Antivirus Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.