Technical Exploitation Analyst

Type of Job


Required Clearance Level

Top Secret/SCI + FSP


Washington, D.C. Metro Area

We're looking for game changers. People who love what they do and who they do it for. Providing consulting services in operational support, intelligence collection, reporting, and data governance, R2C is a leader in delivering solutions for high priority national security concerns. Are you ready for a change?

R2C is seeking Technical Exploitation Analysts to support a client's technical requirements on a mission focused program within a challenging, dynamic setting located in the Washington Metropolitan Area.

We welcome the most challenging problems facing our national security and apply intellect, talent, and innovation to reach feasible and valuable solutions to each challenge. That means we expect our employees to bring their “A game,” and you have the right to expect the same from the company that employs you. We want to hear your ideas. We want to hear your concerns. We want to make sure you have what you need to do the best you can on the job and grow in your career with us over time. Almost all companies say they have a culture of inclusiveness and that they value employee input, but R2C puts that statement to work every day. It’s time for a change. Come and experience a company that actually cares.


  • Provide advanced technical exploitation support and solutions

  • Track enemy TTPs and exploit weaknesses in the use of anti-forensic tools

  • Provide registry analysis and correlating results throughout holding for link analysis

  • Provide technical exploitation tool and script development

  • Provide artifact pattern analysis, exploitation, and cross set link analysis

  • Exploit and provide cross set link analysis in the areas of communication tools and methods, social media, and messaging

  • Provide solutions in uncommon Operating System exploitation to include Linux, Mac, and mobile device OS’s

  • Provide solutions in emerging technology application analysis and exploitation to prevent technological surprise

  • Provide solutions to Internet history and artifact analysis

  • Provide solutions in steganography and other data obfuscation detection and analysis

  • Identify the latest forensic and technical exploitation tools and evaluate tools for inclusion into processes

  • Discover applications of interest used across sets by target groups

  • Discover tactics, techniques, and procedures employed by target groups

  • Generate forensic reports of interest in support of requirements

  • Perform application and internet activities analysis to support source vetting, digital profiling, and other requirements

  • Apply reverse engineering techniques to detect and identify malware

  • Assist in the triage of Site Exploitation activities as required

  • Provide technical support to field collection, hardware exploitation, and firmware exploitation

  • Assist asset validation and credibility assessments by providing baseline assessments of digital media and cellular telephones


  • Computer Science or STEM degree and 2 years of demonstrated technical exploitation experience and skills such as computer forensics, DOMEX, reverse engineering, and malware analysis.

  • Four years of demonstrated experience may be substituted for a Computer Science or STEM degree for a total of six years of required experience

  • Working knowledge and training in intelligence targeting and multi-source analysis

  • Experience designing, implementing and documenting computer forensics

  • Experience conveying technical information effectively and concisely to a wide range of audiences

  • One of more industry-standard forensic certifications (EnCe, ACE, CCFE, GCFH, GCFE, GASF, CCE)

  • Experience in hardware configuration and network/data communications

  • Experience in software engineering and scripting

  • Experience in database technology and database exploitation/forensics

  • Experience in law enforcement evidence seizure

  • Experience conducting intelligence analysis and writing finished intelligence reporting

  • Experience using IC and/or Law Enforcement databases for conducting multi-source analysis

  • DoD 8570 Certification

Preferred Qualifications

  • Experience with developing forensic and technical exploitation standards

  • Subject Matter Expert-level experience with technical support for customers and deployed platforms

  • Global Technical Exploitation response experience

  • Experience with planning and integrating full-spectrum technical exploitation plans, exercises, training and operations as required

The Reports and Requirements Company, LLC (R2C) is a wholly owned subsidiary of Buchanan & Edwards, and provides consulting services in operational support, intelligence collection, reporting, and data governance. Located in Arlington, VA, R2C offers expertise on a variety of national security topics, with specific focus on operational support, technical operations, policies and management of large volumes of data, analysis of large amounts of data, & effective approaches to evaluating and sharing data, and innovative techniques for information collection. Our consultants develop and deliver training programs on subjects including cyber intelligence, data governance and information sharing protocols, intelligence collection, and reporting techniques. R2C has a mission first culture and boasts the benefits & perks of a small company with the resources, stability, and career mobility of a large corporation. R2C is dedicated to fostering, cultivating and preserving a culture of diversity and inclusion. We are committed to crafting a workplace that endorses creativity and innovation, and promotes engagement through open communication, acceptance of new people and ideas, and a supportive team dynamic.

R2C is an Equal Opportunity Employer – Minorities / Women / Veterans / Individuals with Disabilities / Gender Identity / Sexual Orientation.

1700 N Moore St. 

Suite 2110

Arlington, VA 22209

P: 703-535-5511 • F: 703-997-5515

  • White LinkedIn Icon
  • White Twitter Icon

©  2016 The Reports and Requirements Company, LLC. All Rights Reserved.