Digital Network Exploitation Analyst - Honolulu, United States - Department Of Defense

    Default job background
    Full time
    Description

    Summary



    NSA is in search of Computer Science professionals to solve complex problems, test innovative approaches and research new solutions to storing, manipulating, and presenting information.

    Apply your computer science expertise to projects that seek to create new standards for the transformation of information. If you want to develop technologies and tools and be a part of cutting edge innovations, join our team of experts

    Duties


    The need to maintain our core Computer Science group is vital to provide the technical capabilities necessary to successfully execute NSA's mission.

    The increased complexity of supporting NSA's mission requires world class researchers, programmers, and developers who operate in teams in areas such as software engineering, information technology infrastructure, high performance computing, data science, architectures, computer security, and networking in order to design and develop advanced tools, techniques, and systems.


    Digital Network Exploitation Analysts employ computer science skills to perform discovery and target technology analysis of digital network and mobile communications.

    Digital Network Exploitation Analysts are hired into positions directly supporting a technical mission office or an Agency Development Program.

    Both the Digital Network Exploitation Analyst (DNEA) Development Program (DDP) and the Intrusion Analyst Skill Development Program (IASDP) are 3 year programs that combine formal training (i.e., SIGINT, discovery/analysis, and advanced cyber security) and diverse work assignments.

    As a Digital Network Exploitation Analyst at the NSA, responsibilities may include:

    • conducting analysis of metadata
    - conducting target analysis and research

    - identifying target communications within the global network

    - performing global network analysis and mapping

    - using knowledge of customer requirements to analyze and process intelligence information

    - performing exploitation and operations on target networks