Sign Up Sign Up Log In Sign Up
This job has expired and you can't apply for it anymore. Start a new search.

Technical Exploitation Analyst (Mid-level)

Job Description

CACI is seeking a Technical Exploitation Specialist to pursue a career supporting CACI’s growing Intelligence Services market. Supported by our newly developed job framework, CACI provides clearly defined career paths for employees to grow and progress within our company.

Specific duties include:

  • Advanced technical exploitation support and solutions to include:
    • Processes and methods to identify and track enemy TTPs and exploiting weaknesses in the use of anti-forensic tools
    • Processes and methods to registry analysis and correlating results throughout NMEC holdings for link analysis
    • Technical exploitation tool and script development
    • Artifact pattern analysis, exploitation, and cross set link analysis
    • Processes and methods to exploit and deliver cross set link analysis in the areas of communication tools and methods, social media and messaging
    • Processes and methods in uncommon Operating System exploitation to include Linux, Mac, and mobile device OS's
    • Processes and methods in emerging technology application analysis and exploitation to prevent technological surprise
    • Processes and methods to Internet history and artifact analysis
    • Processes and methods in steganography and other data obfuscation detection and analysis
    • Research cutting edge technology in the area of forensic and technical exploitation tools
    • Cross collection exploitation to include:
      • Discovery, research and analysis of applications of interest used across sets by target groups
      • Discovery, research and analysis of tactics, techniques, and procedures employed by target groups
  • Draft and finalize professional technical exploitation reports of interests
  • Execute application and internet activities analysis to support source vetting, digital profiling, and other requirements
  • Perform reverse engineering processes and methods to detect and identify malware
  • Synchronize, develop, and promote forensic and technical exploitation standards for forward deployed assets
  • Provide Subject Matter Expert-level technical support for customers
  • Deliver global Technical Exploitation response capabilities
  • Plan, coordinate, and perform full-spectrum technical exploitation plans, exercises, training and operations
  • Support the triage of Site Exploitation (SE) activities
  • Deliver technical support to field collection and other operational partner elements to include:
    • Diverse set of technical exploitation tools & tradecraft
    • Hardware Exploitation
    • Firmware Exploitation
  • Support asset validation & credibility assessments by providing baseline assessments of digital media and cellular telephones

Required Qualifications:

  • Must have a STEM degree and 2 years of demonstrated technical exploitation experience and skills such as computer forensics, DOMEX, reverse engineering, and malware analysis; or, 4 years of demonstrated technical exploitation experience and skills such as computer forensics, DOMEX, reverse engineering, and malware analysis.
  • Background and training in intelligence targeting and multi-source analysis
  • Background designing, implementing and documenting computer forensics services to include evidence seizure, computer forensic analysis and data recovery
  • Background conveying technical information effectively and concisely to a wide range of audiences
  • Possesses industry standard forensic certifications: EnCE, and ACE, or CCE, or GIAC
  • Background in hardware configuration and network/data communications
  • Background in software development and scripting
  • Background in database technology and database exploitation/forensics
  • Background in law enforcement evidence seizure
  • Background conducting targeting, intelligence analysis and writing finished intelligence reporting
  • Proven background and understands how to use IC and/or Law Enforcement databases for performing multi-source analysis
  • Background in prioritizing work assignments and producing reporting on a time sensitive basis
  • Must possess an active TS/SCI clearance with polygraph.

What We Can Offer You:

- We’ve been named a Best Place to Work by the Washington Post.

- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.

- We offer competitive benefits and learning and development opportunities.

- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.

- For over 55 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.


Job Location



CACI employs a diverse range of talent to create an environment that fuels innovation and fosters continuous improvement and success. At CACI, you will have the opportunity to make an immediate impact by providing information solutions and services in support of national security missions and government transformation for Intelligence, Defense, and Federal Civilian customers. CACI is proud to provide dynamic careers for employees worldwide. CACI is an Equal Opportunity Employer - Females/Minorities/Protected Veterans/Individuals with Disabilities.

Company Name:
Security Clearance:
Top Secret / SCI + Poly
Bethesda, Maryland
United States
Not Specified
Job Number:

Send me email alerts for similar jobs