• Network and Threat Forensic Support Specialist (Senior)

    Location US-MD-Ft. Meade
    Posted Date 1 month ago(3/15/2018 2:53 PM)
    Job ID
    # Positions
    Experience (Years)
    Cyber Security
  • Overview

    WOOD is currently hiring a Network and Threat Forensic Support Specialist (Senior) to join our team in the Ft. Meade, MD area.  This is a full-time, career oriented opportunity and requires current TS/SCI with poly. 

    What we offer:

    • Creative work environment that promotes professional growth
    • Company paid insurance through Carefirst: Medical, Dental, Vision
    • Company matching 401K
    • 4 weeks of PTO and 10 paid holidays
    • Professional Improvment and Educational reimbursement- up to $5000 annually
    • Continued training through WOOD University
    • WOOD is a certified PMI trainer
    • Competitive salary and much much more!


    • Support operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target networks.
    • Perform security assessments, forensic and malware analysis on a variety of information systems. 


    *All Candidates must have a TS/SCI clearance with a Polygraph

    • Shall have a minimum of eight (8) continuous years of work experience in network and vulnerability analysis, or a combination of a minimum of five (5) continuous years of work experience in network and vulnerability analysis and a Bachelor’s degree in an applicable (math, science, computers, engineering) field. Work experience shall include five (5) years of IC experience in network and vulnerability analysis.
    • Shall have demonstrated ability to independently and accurately evaluate multiple operating systems, network configurations, network architectures, and topologies for potential technical and/or operational vulnerabilities. Must demonstrate in-depth knowledge of network tools used to assess traffic at the application layer, rendering the ability to identify and interpret anomalous activity in packet details.
    • Shall demonstrate the ability to aid in generating SNORT and other Intrusion Detection Signatures for multiple platforms, thus aiding with defeats and allowing for enhanced detection in collection.
    • Shall demonstrate the ability to use various in-house, commercial and freeware tools to interpret and analyze technical data and the ability to document and report technical findings for internal and external customer use.
    • Shall have demonstrated expertise related to the use of relevant CNO and SIGINT tools and databases used for the customer mission. Shall also demonstrate analytic ability to discover unknown, suspicious or exploitation activity, be able to provide briefings of intrusion set activity to partner organizations I agencies, and be knowledgeable about all forms of reporting and experienced with creating each product type, and thus be able to organize training for other team members on analysis, tools, or
    • Shall have demonstrated analytic expertise to perform technical and overall analysis of unknown, suspicious or exploitation activity identified, and communications skills that include the ability to provide formal documentation of analysis and/or research results.
    • Shall be considered a Subject Matter Expert in one or more fields appropriate to Intelligence Analysis or Computer Networking technologies, and be able to serve as Subject Matter Expert for working groups and meetings with partner organizations agencies.
    • Shall have demonstrated expertise in analyzing intelligence information and technical data, analyzing exploitation opportunities, documenting information and processes, gathering intelligence information of an identified activity through SIGINT and/or other intelligence disciplines, Internet, and other research means, interpreting analytical results, writing and editing skills at a technical/professional level, and managing internal and external customer relations.
    • Shall have demonstrated skills working through the SIGINT or other intelligence production processes, to include tasking, researching, processing, reporting, and disseminating of collection, information, or final products. Shall demonstrate the ability to understand and interpret technical data through knowledge of technologies and topologies.
    • Have experience in Python and BASH.
    • Knowledge of the creation of hashes and comparing them to hashes of known malware. 

    WOOD is an Equal Employment Opportunity Employer; all qualified applicants are encouraged to apply and will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, or veteran status.


    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed