*All Candidates must have a TS/SCI clearance with a Full Scope Polygraph
- Shall have a minimum of eight (8) continuous years of work experience in network and vulnerability analysis, or a combination of a minimum of five (5) continuous years of work experience in network and vulnerability analysis and a Bachelor’s degree in an applicable (math, science, computers, engineering) field. Work experience shall include five (5) years of IC experience in network and vulnerability analysis.
- Shall have demonstrated ability to independently and accurately evaluate multiple operating systems, network configurations, network architectures, and topologies for potential technical and/or operational vulnerabilities. Must demonstrate in-depth knowledge of network tools used to assess traffic at the application layer, rendering the ability to identify and interpret anomalous activity in packet details.
- Shall demonstrate the ability to aid in generating SNORT and other Intrusion Detection Signatures for multiple platforms, thus aiding with defeats and allowing for enhanced detection in collection.
- Shall demonstrate the ability to use various in-house, commercial and freeware tools to interpret and analyze technical data and the ability to document and report technical findings for internal and external customer use.
- Shall have demonstrated expertise related to the use of relevant CNO and SIGINT tools and databases used for the customer mission. Shall also demonstrate analytic ability to discover unknown, suspicious or exploitation activity, be able to provide briefings of intrusion set activity to partner organizations I agencies, and be knowledgeable about all forms of reporting and experienced with creating each product type, and thus be able to organize training for other team members on analysis, tools, or
- Shall have demonstrated analytic expertise to perform technical and overall analysis of unknown, suspicious or exploitation activity identified, and communications skills that include the ability to provide formal documentation of analysis and/or research results.
- Shall be considered a Subject Matter Expert in one or more fields appropriate to Intelligence Analysis or Computer Networking technologies, and be able to serve as Subject Matter Expert for working groups and meetings with partner organizations agencies.
- Shall have demonstrated expertise in analyzing intelligence information and technical data, analyzing exploitation opportunities, documenting information and processes, gathering intelligence information of an identified activity through SIGINT and/or other intelligence disciplines, Internet, and other research means, interpreting analytical results, writing and editing skills at a technical/professional level, and managing internal and external customer relations.
- Shall have demonstrated skills working through the SIGINT or other intelligence production processes, to include tasking, researching, processing, reporting, and disseminating of collection, information, or final products. Shall demonstrate the ability to understand and interpret technical data through knowledge of technologies and topologies.
- Have experience in Python and BASH.
- Knowledge of the creation of hashes and comparing them to hashes of known malware.
WOOD is an Equal Employment Opportunity Employer; all qualified applicants are encouraged to apply and will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, or veteran status.