Technical Exploitation Analyst

Type of Job

Technical

Required Clearance Level

Top Secret/SCI + FSP

Location

Washington, D.C. Metro Area

We're looking for game changers. People who love what they do and who they do it for. Providing consulting services in operational support, intelligence collection, reporting, and data governance, R2C is a leader in delivering solutions for high priority national security concerns. Are you ready for a change?


R2C is seeking Technical Exploitation Analysts to support a client's technical requirements on a mission focused program within a challenging, dynamic setting located in the Washington Metropolitan Area.


We welcome the most challenging problems facing our national security and apply intellect, talent, and innovation to reach feasible and valuable solutions to each challenge. That means we expect our employees to bring their “A game,” and you have the right to expect the same from the company that employs you. We want to hear your ideas. We want to hear your concerns. We want to make sure you have what you need to do the best you can on the job and grow in your career with us over time. Almost all companies say they have a culture of inclusiveness and that they value employee input, but R2C puts that statement to work every day. It’s time for a change. Come and experience a company that actually cares.

Responsibilities

  • Provide advanced technical exploitation support and solutions

  • Track enemy TTPs and exploit weaknesses in the use of anti-forensic tools

  • Provide registry analysis and correlating results throughout holding for link analysis

  • Provide technical exploitation tool and script development

  • Provide artifact pattern analysis, exploitation, and cross set link analysis

  • Exploit and provide cross set link analysis in the areas of communication tools and methods, social media, and messaging

  • Provide solutions in uncommon Operating System exploitation to include Linux, Mac, and mobile device OS’s

  • Provide solutions in emerging technology application analysis and exploitation to prevent technological surprise

  • Provide solutions to Internet history and artifact analysis

  • Provide solutions in steganography and other data obfuscation detection and analysis

  • Identify the latest forensic and technical exploitation tools and evaluate tools for inclusion into processes

  • Discover applications of interest used across sets by target groups

  • Discover tactics, techniques, and procedures employed by target groups

  • Generate forensic reports of interest in support of requirements

  • Perform application and internet activities analysis to support source vetting, digital profiling, and other requirements

  • Apply reverse engineering techniques to detect and identify malware

  • Assist in the triage of Site Exploitation activities as required

  • Provide technical support to field collection, hardware exploitation, and firmware exploitation

  • Assist asset validation and credibility assessments by providing baseline assessments of digital media and cellular telephones

Qualifications

  • Computer Science or STEM degree and 2 years of demonstrated technical exploitation experience and skills such as computer forensics, DOMEX, reverse engineering, and malware analysis.

  • Four years of demonstrated experience may be substituted for a Computer Science or STEM degree for a total of six years of required experience

  • Working knowledge and training in intelligence targeting and multi-source analysis

  • Experience designing, implementing and documenting computer forensics

  • Experience conveying technical information effectively and concisely to a wide range of audiences

  • One of more industry-standard forensic certifications (EnCe, ACE, CCFE, GCFH, GCFE, GASF, CCE)

  • Experience in hardware configuration and network/data communications

  • Experience in software engineering and scripting

  • Experience in database technology and database exploitation/forensics

  • Experience in law enforcement evidence seizure

  • Experience conducting intelligence analysis and writing finished intelligence reporting

  • Experience using IC and/or Law Enforcement databases for conducting multi-source analysis

  • DoD 8570 Certification

Preferred Qualifications

  • Experience with developing forensic and technical exploitation standards

  • Subject Matter Expert-level experience with technical support for customers and deployed platforms

  • Global Technical Exploitation response experience

  • Experience with planning and integrating full-spectrum technical exploitation plans, exercises, training and operations as required

The Reports and Requirements Company, LLC. (R2C) is proud to be an Affirmative Action/Equal Opportunity Employer and is committed to providing equal employment opportunity for all persons in all facets of employment. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, gender, sexual orientation, gender identity, national origin, citizenship status, marital status, genetic information, disability, protected veteran status or any other legally protected status. If you are an individual with a disability or a disabled veteran and require a reasonable accommodation in applying for any posted position, please contact Human Resources by email at HR@ther2c.com. As a federal government contractor, in accordance with applicable laws, regulations, and Executive Orders, R2C is required to develop annual Affirmative Action Plans (AAPs). Any employees or applicants who wish to review the Affirmative Action Plan (AAP) for Protected Veterans and Individuals with Disabilities can contact us by sending an email to HR@ther2c.com
EEO is the Law. Applicants to and employees of R2C are protected under Federal law from discrimination. Click here to find out more. Pursuant to Executive Order 13665, R2C will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c).

1700 N Moore St. 

Suite 2110

Arlington, VA 22209

P: 703-535-5511 • F: 703-997-5515

  • White LinkedIn Icon
  • White Twitter Icon

©  2016 The Reports and Requirements Company, LLC. All Rights Reserved.