Apply

Ready to go for it?

AI Apply speeds things up—apply directly if you prefer.

FREE ACCESS
5,000–10,000 jobs/day
JobTailor Logo

See all jobs on JobTailor

Search thousands of fresh jobs every day.

Discover
  • Fresh listings
  • Fast filters
  • No subscription required
Create a free account and start exploring right away.
Markon

Defense Network Exploitation Analyst, Level 2

Markon

. Have the ability to perform technical analysis of metadata and content for systems and networks of interest across several communications technologies and protocols .

Posted 4/21/2026full-timeFort Meade • Maryland • 🇺🇸 United StatesJuniorMid-Level💰 $160,000 - $170,000 per yearWebsite

Tech Stack

Tools & technologies
AssemblyCloudJavaPythonSwitchingTCP/IPTypeScriptVoIP

About the role

Key responsibilities & impact
  • Have the ability to perform technical analysis of metadata and content for systems and networks of interest across several communications technologies and protocols
  • Characterize target network capabilities and vulnerabilities using advanced application analysis
  • Support development of new techniques to exploit targets
  • Use current IC tools and databases to research relevant intelligence sources
  • Have a desire for continual learning and strong problem-solving, analytic and interpersonal skills that are:
  • flexible - able to communicate effectively
  • able to collaborate with others
  • Have specialized skills and experience in one or more of the following is desired:
  • Knowledge of network protocols (especially TCP/IP, VOIP, wireless protocols)
  • Understanding of Internet
  • Understanding of WAN and LAN Vulnerability analysis
  • Programming experience (prefer one or more of the following: C, C++, Java, Assembly, Python)

Requirements

What you’ll need
  • TS/SCI with Active Polygraph
  • Digital network analysis, characterization, or exploitation analysis
  • Must be able to demonstrate knowledge and understanding of communication networks and security issues such as vulnerabilities and common hacker TTPs
  • Computer networking and telecommunication architecture, the OSI model, communication protocols, TCP/IP, IPv6, routing concepts, network mapping, sub-netting and target templating
  • Public Switching Telephone Network Infrastructure
  • Mobile technologies and geospatial analysis
  • Knowledgeable in advanced analytic techniques
  • Basic understanding of cloud architecture and data flow
  • Familiarity with vulnerabilities and malware
  • A Bachelor’s degree and 2-11 years of relevant experience, a Master’s degree plus 3-9 years of relevant experience or a Doctoral degree and 2-7 years of relevant experience
  • An Associate’s degree plus 4-13 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.

Benefits

Comp & perks
  • Medical
  • Dental
  • Vision
  • Life Insurance
  • Short-Term Disability
  • Long-Term Disability
  • 401(k) match
  • Flexible Spending Accounts
  • EAP
  • Training and Tuition Assistance
  • Paid Time Off
  • Holidays

ATS Keywords

✓ Tailor your resume
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
CC++JavaAssemblyPythonTCP/IPVOIPwireless protocolsWAN Vulnerability analysisLAN Vulnerability analysis
Soft Skills
problem-solvinganalytical skillsinterpersonal skillseffective communicationcollaboration
Certifications
TS/SCI with Active Polygraph