Trusted leaders in SIGINT lifecycle and risk-intelligence.
VEDO Corp is a national security technologies firm that provides tailored, highly skilled, specialized, and confidential services satisfying the needs of our clients.
Our methodology and technical capabilities are built on decades of defense security experience and real-world operations. We employ world-class operators and leverage custom analysis platforms to identify, understand and defend against broad, global threats.
We are a veteran-owned small business that prides itself in delivering world-class services that enable our clients to focus on their core mission with confidence.
Perks
- Full Benefits
- 10% 401K Match
- 200 Hrs. of PTO
- Company with a proven culture of excellence, diversity, and employees-first
As a Digital Network Exploitation Analyst, You Will
- Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans.
- Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.
- Be involved in developing new tradecraft needed to perform this analysis as technologies evolve.
- Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.
- Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
- Distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers.
Qualifications
- Active TS/SCI with polygraph
Specific labor category determined by years of experience + educational degrees
Relevant Experience must be in computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) may be considered towards the relevant experience requirement (i.e., 24-week JCAC course may count as 6 months of experience).
In some cases, foreign language proficiency may also be used to satisfy experience requirements.
Level 1
- 2 years’ applicable experience with a bachelor’s degree, OR
- 4 years’ applicable experience with associate degree
Level 2
- 2 years’ applicable experience with a PhD, OR
- 3 years’ applicable experience with a master’s degree, OR
- 5 years’ applicable experience with a bachelor’s degree, OR
- 7 years’ applicable experience with an associate degree
Level 3
- 4 years’ applicable experience with a PhD, OR
- 6 years’ applicable experience with a master’s degree, OR
- 8 years’ applicable experience with a bachelor’s degree, OR
- 10 years’ applicable experience with an associate degree
Level 4
- 7 years’ applicable experience with a PhD, OR
- 9 years’ applicable experience with a master’s degree, OR
- 11 years’ applicable experience with a bachelor’s degree, OR
- 13 years’ applicable experience with an associate degree