Cyber Data Exploitation Analyst

Company: MVM, Inc.
Location: Arlington , Virginia, United States
Type: Full-time
Posted: 02.SEP.2020

Summary

Data Exploitation Analyst/EngineerWe are seeking a Cyber Data Exploitation Analyst to support a clients operations by leveraging numerous an...

Description

Data Exploitation Analyst/EngineerWe are seeking a Cyber Data Exploitation Analyst to support a clients operations by leveraging numerous analytic tools and databases to evaluate information. The Data Exploitation Analysts will be responsible for identifying, gathering, and extracting identity-based intelligence information that enhances and enriches data repositories. Analysts will be responsible for addressing intelligence gaps and data validation pertaining to terrorist identity records. The candidate will be involved in pre-mission support, data collection, analyst & evaluation, and report generation.This position requires an active security clearance and will support our client 100% onsite.Data Exploitation Analyst/Engineer to provide the following support:Use proprietary software and systems in a network of workstations and personal computers to perform basic imaging enhancement, display, and analytical functions to obtain, organize, and present information relevant to the exploitation of remotely sensed and imaged data obtained.Review operations related data logs, worksheets, and reports to determine focal points for the analysis as well as discovery of deficiencies and discrepancies in the performance of data collection equipment and systems.Preparation of formal written technical reports as well as oral briefs to report analysis findings and conclusions to the customer. Perform analysis for specified target sets and format the information for dissemination.Perform technical metadata and content analysis of threat adversary automated information systems. Other duties may be assignedData Exploitation Analyst/Engineer position requirements:3 + years of experience operating systems structures of Unix/Linux, Microsoft Windows, Apple, and their internals (e.g. process management, directory structure, and installing applications).1 + year of experience in collecting, viewing and identifying law enforcement information on targets of interest from metadata (e.g. email, http) and then applying information towards a computerized collection system.Capable of performing data fusion from existing intelligence for enabling new and continued collection of data requested weekly by the field.Recognizes technical information that may be used for leads to enable remote operations (data includes users, passwords, email addresses, IP (Internet Protocol) ranges of the target, frequency in domain servers and SMTP (Simple Mail transfer Protocol) header information.1 + year of performing general accounting capabilities and maintaining a Microsoft Excel spreadsheet for the field and auditing purposes.Capable of using non-attributable networks, trace work tools and then interpreting that for network analysis in a written format upon request by a project manager (monthly).Perform terminal or environmental collection (process, objectives, organization, targets, network devices, etc.) and then reporting the details of that collection upon request (monthly).Provide assistance in conducting virtual currency seizures involving block chain technology (e.g. Bitcoin and Alt Coins) in real time.Familiarized with centralized, decentralized networks to include virtual currency wallet hosting services and virtual currency node traffic/network to understand the vulnerabilities in utilizing node networks.For more information about the company please visit our website at is an Equal Opportunity Employer and does not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, disability or any other federal, state or local protected class.

 
Apply Now

Share

Free eBook

Flash-bkgn
Loader2 Processing ...