FREE ACCESS
5,000–10,000 jobs/day

See all jobs on JobTailor
Search thousands of fresh jobs every day.
Discover
- Fresh listings
- Fast filters
- No subscription required
Create a free account and start exploring right away.

Defense Network Exploitation Analyst, Level 3
Markon. Have the ability to perform technical analysis of metadata and content for systems and networks of interest across several communications technologies and protocols .
Posted 4/21/2026full-timeFort Meade • Maryland • 🇺🇸 United StatesJuniorMid-Level💰 $180,000 - $190,000 per yearWebsite
Tech Stack
Tools & technologiesAssemblyCloudJavaPythonSwitchingTCP/IPTypeScriptVoIP
About the role
Key responsibilities & impact- Have the ability to perform technical analysis of metadata and content for systems and networks of interest across several communications technologies and protocols
- Characterize target network capabilities and vulnerabilities using advanced application analysis
- Support development of new techniques to exploit targets
- Use current IC tools and databases to research relevant intelligence sources
- Have a desire for continual learning and strong problem-solving, analytic and interpersonal skills that are:
- flexible - able to communicate effectively
- able to collaborate with others
- Have specialized skills and experience in one or more of the following is desired:
- Knowledge of network protocols (especially TCP/IP, VOIP, wireless protocols)
- Understanding of Internet
- Understanding of WAN and LAN Vulnerability analysis
- Programming experience (prefer one or more of the following: C, C++, Java, Assembly, Python)
Requirements
What you’ll need- TS/SCI with Active Polygraph
- Digital network analysis, characterization, or exploitation analysis
- Must be able to demonstrate knowledge and understanding of communication networks and security issues such as vulnerabilities and common hacker TTPs
- Computer networking and telecommunication architecture, the OSI model, communication protocols, TCP/IP, IPv6, routing concepts, network mapping, sub-netting and target templating
- Public Switching Telephone Network Infrastructure
- Mobile technologies and geospatial analysis
- Knowledgeable in advanced analytic techniques
- Basic understanding of cloud architecture and data flow
- Familiarity with vulnerabilities and malware
- Depending on the Level, a Bachelor’s degree and 2-11 years of relevant experience, a Master’s degree plus 3-9 years of relevant experience or a Doctoral degree and 2-7 years of relevant experience.
- An Associate’s degree plus 4-13 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.
Benefits
Comp & perks- Medical
- Dental
- Vision
- Life Insurance
- Short-Term Disability
- Long-Term Disability
- 401(k) match
- Flexible Spending Accounts
- EAP
- Training and Tuition Assistance
- Paid Time Off
- Holidays
ATS Keywords
✓ Tailor your resumeApplicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
CC++JavaAssemblyPythonTCP/IPVOIPwireless protocolsWAN Vulnerability analysisLAN Vulnerability analysis
Soft Skills
problem-solvinganalytical skillsinterpersonal skillsflexibilityeffective communicationcollaboration
Certifications
TS/SCI with Active Polygraph