Technical Exploitation Analyst
Type of Job
Required Clearance Level
Top Secret/SCI + FSP
Washington, D.C. Metro Area
We're looking for game changers. People who love what they do and who they do it for. Providing consulting services in operational support, intelligence collection, reporting, and data governance, R2C is a leader in delivering solutions for high priority national security concerns. Are you ready for a change?
R2C is seeking Technical Exploitation Analysts to support a client's technical requirements on a mission focused program within a challenging, dynamic setting located in the Washington Metropolitan Area.
We welcome the most challenging problems facing our national security and apply intellect, talent, and innovation to reach feasible and valuable solutions to each challenge. That means we expect our employees to bring their “A game,” and you have the right to expect the same from the company that employs you. We want to hear your ideas. We want to hear your concerns. We want to make sure you have what you need to do the best you can on the job and grow in your career with us over time. Almost all companies say they have a culture of inclusiveness and that they value employee input, but R2C puts that statement to work every day. It’s time for a change. Come and experience a company that actually cares.
Provide advanced technical exploitation support and solutions
Track enemy TTPs and exploit weaknesses in the use of anti-forensic tools
Provide registry analysis and correlating results throughout holding for link analysis
Provide technical exploitation tool and script development
Provide artifact pattern analysis, exploitation, and cross set link analysis
Exploit and provide cross set link analysis in the areas of communication tools and methods, social media, and messaging
Provide solutions in uncommon Operating System exploitation to include Linux, Mac, and mobile device OS’s
Provide solutions in emerging technology application analysis and exploitation to prevent technological surprise
Provide solutions to Internet history and artifact analysis
Provide solutions in steganography and other data obfuscation detection and analysis
Identify the latest forensic and technical exploitation tools and evaluate tools for inclusion into processes
Discover applications of interest used across sets by target groups
Discover tactics, techniques, and procedures employed by target groups
Generate forensic reports of interest in support of requirements
Perform application and internet activities analysis to support source vetting, digital profiling, and other requirements
Apply reverse engineering techniques to detect and identify malware
Assist in the triage of Site Exploitation activities as required
Provide technical support to field collection, hardware exploitation, and firmware exploitation
Assist asset validation and credibility assessments by providing baseline assessments of digital media and cellular telephones
Computer Science or STEM degree and 2 years of demonstrated technical exploitation experience and skills such as computer forensics, DOMEX, reverse engineering, and malware analysis.
Four years of demonstrated experience may be substituted for a Computer Science or STEM degree for a total of six years of required experience
Working knowledge and training in intelligence targeting and multi-source analysis
Experience designing, implementing and documenting computer forensics
Experience conveying technical information effectively and concisely to a wide range of audiences
One of more industry-standard forensic certifications (EnCe, ACE, CCFE, GCFH, GCFE, GASF, CCE)
Experience in hardware configuration and network/data communications
Experience in software engineering and scripting
Experience in database technology and database exploitation/forensics
Experience in law enforcement evidence seizure
Experience conducting intelligence analysis and writing finished intelligence reporting
Experience using IC and/or Law Enforcement databases for conducting multi-source analysis
DoD 8570 Certification
Experience with developing forensic and technical exploitation standards
Subject Matter Expert-level experience with technical support for customers and deployed platforms
Global Technical Exploitation response experience
Experience with planning and integrating full-spectrum technical exploitation plans, exercises, training and operations as required
The Reports and Requirements Company, LLC (R2C) is a wholly owned subsidiary of Buchanan & Edwards, and provides consulting services in operational support, intelligence collection, reporting, and data governance. Located in Arlington, VA, R2C offers expertise on a variety of national security topics, with specific focus on operational support, technical operations, policies and management of large volumes of data, analysis of large amounts of data, & effective approaches to evaluating and sharing data, and innovative techniques for information collection. Our consultants develop and deliver training programs on subjects including cyber intelligence, data governance and information sharing protocols, intelligence collection, and reporting techniques. R2C has a mission first culture and boasts the benefits & perks of a small company with the resources, stability, and career mobility of a large corporation. R2C is dedicated to fostering, cultivating and preserving a culture of diversity and inclusion. We are committed to crafting a workplace that endorses creativity and innovation, and promotes engagement through open communication, acceptance of new people and ideas, and a supportive team dynamic.
R2C is an Equal Opportunity Employer – Minorities / Women / Veterans / Individuals with Disabilities / Gender Identity / Sexual Orientation.