Logo
ClearanceJobs

Exploitation Analyst (TS/SCI with Poly Required)

ClearanceJobs, Baltimore, Maryland, United States, 21276

Save Job

Exploitation Analyst

Join our Deloitte Cyber team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. In this role you will: Apply data and technical expertise to perform file signature analysis, real-time forensic analysis, and report intelligence-derived significant network events and intrusions Conduct research and analysis at the operational or strategic level Communicate your assessments in operational- or strategic-level analytic intelligence products and through oral briefings Threat analysis includes assessments identifying and describing threat actors, activities, platforms, and targets-as well as how they interact-and providing an understanding of the presence, intent, and capabilities of the identified threats Our team of over 15,000+ professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise. Required: Bachelors Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., Computer Science, Cyber Security, Software Engineering, Information Assurance, etc.) TS/SCI/ with Polygraph Required Minimum of 5 years of professional experience in cybersecurity, with at least 3 years focused on cyber exploitation analysis, threat intelligence, or incident response. Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future Ability to travel up to 25% on average, based on the work you do and the clients and industries/sectors you serve Must be onsite for this role Demonstrated experience analyzing advanced persistent threats (APTs), malware, and exploitation techniques. Hands-on experience with vulnerability assessment, penetration testing, or red teaming. Proficiency in network traffic analysis, log analysis, and digital forensics. Strong knowledge of operating systems (Windows, Linux, macOS) and common network protocols. Experience with reverse engineering tools (e.g., IDA Pro, Ghidra) and malware analysis. Familiarity with scripting or programming languages (e.g., Python, PowerShell, Bash). Experience with security monitoring tools (e.g., SIEM, IDS/IPS, endpoint detection and response). Preferred: Certification in: Certified Ethical Hacker, Computer Hacking Forensic Investigator, CompTIA Cyber Security Analyst, CompTIA Cloud+, CompTIA Pentest+, GCHI-GIAC Certified Incident Handler, Cyber Security Incident Responder OR GIAC Response and Industrial Defense Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will count as 6 months of experience). Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.