Target Digital Network Analyst (TDNA) jobs in United States
cer-icon
Apply on Employer Site
company-logo

Parsons Corporation · 1 day ago

Target Digital Network Analyst (TDNA)

Parsons Corporation is a company focused on delivering innovative solutions to meet the needs of its clients. They are seeking a Target Digital Network Analyst to conduct advanced analysis for cybersecurity projects, focusing on improving the security of critical government systems.

Building MaterialConstructionConsultingIndustrial EngineeringInformation TechnologyInfrastructureMilitarySecurity
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Your effort and expertise are crucial to the success and execution of this impactful mission. This opportunity supports a team of Target Analyst Reporters and Target Digital Network Analysts, responsible for improving, protecting, and defending our Nation’s Security
The Target Digital Network Analyst conducts advanced analysis of collection and open-source data to ensure target continuity, to profile targets and their activities, and develop techniques to gain more target information
The Target Digital Network Analyst has an understanding the principles and methods of exploiting foreign communications and communication systems to identify, collect, analyze process and disseminate information in accordance with established requirements and priorities; analyzes DNI data for reportable intelligence information and building target profiles; maintains appropriate databases for targeting, tasking, and analysis; performs sustained target analysis and enhancement through the use of DNI and DNR analytic techniques; analyzes DNI data to identify new access development opportunities for follow-on collection requirements; performs research using open source and classified sources to develop comprehensive baseline profiles of designated target sets; identifies intelligence gaps and evaluating the intelligence gathered in order to either tailor current collection or enable new collection to close the gaps

Qualification

DNI analysisDNR analysisTarget analysisVulnerability assessmentPenetration testingIncident responseNetwork forensicsOpen-source analysisSoft skills

Required

Experience in analyzing DNI and DNR information for intelligence reporting
Proficiency in conducting sustained target analysis and utilizing advanced analytic techniques
Ability to build and maintain target profiles and relevant databases for targeting, tasking, and analysis
Strong skills in evaluating intelligence to identify gaps and tailor collection efforts
Familiarity with open-source data and collection analysis
Knowledge of relevant databases and tools for targeting and analysis
Active TS/SCI + Polygraph

Preferred

Bachelor's degree in a STEM field preferred; may substitute four (4) years of relevant experience
Minimum of five (5) years' experience in two (2) or more of the following areas: Computer Network Exploitation, Computer Network Attack, Vulnerability Assessment, Penetration Testing, Incident Response, Network and/or host forensics, Cryptanalytic work in military or intelligence community organization, Cryptology work in military or intelligence community organization
Minimum three (3) years' experience in three (3) or more of the following areas: Analysis of host data at rest, including Microsoft Windows operating systems, system internals, file attributes, Executable file analysis (particularly PE files including dynamic linked libraries), File Hashing and Fuzzy File Hashing (e.g., ssdeep, fciv, and md5deep), Forensic analysis of Windows systems, Linux systems, and/or mobile devices, Commercial, open source of GOTS tools for intrusion detection (e.g., Snort, BroIDS), Packet capture/evaluation (e.g, tcpdump, ethereal/wireshark, NOSEHAIR), Network mapping/discovery (e.g., nmap, TRICKLER), Industry standard system/network tools (e.g., netcat, netstat, traceroute, rpcinfo, nbtscan, snmpwalk, Sysinternals suite), Exploit development of Microsoft Windows operating systems, Exploit development of Linux operating systems, Exploit development of personal computer device/mobile device operating systems (e.g., Android, Blackberry, iPhone, and iPad), Software Reverse Engineering to include use of code disassemblers (e.g., IDA Pro) and debugging unknown code (e.g., Ollydbg), Analysis of code in memory, including analysis of RAM snapshots, Windows crash dump files, and/or Linux kernel dumps, SID(S2)/NTOC analysis and production working cyber adversary intrusion set/targets, foreign network intelligence analysis or the identification and extraction of digitally transported information

Benefits

Medical
Dental
Vision
Paid time off
401(k)
Life insurance
Flexible work schedules
Holidays

Company

Parsons Corporation

company-logo
Parsons is an engineering, construction, technical and management services firm for national security and global infrastructure markets.

Funding

Current Stage
Public Company
Total Funding
$700M
2024-02-21Post Ipo Debt· $700M
2019-05-07IPO

Leadership Team

leader-logo
Carey Smith
Chair, President and CEO
linkedin
leader-logo
Matthew Ofilos
Chief Financial Officer
linkedin
Company data provided by crunchbase