Period of performance: 2 years
Clearance: TS/SCI (held in Scattered Castles for DHS preferred, but not required)
Conducts full-scope technical exploitation examinations; performs advanced registry and Internet history analysis, steganography detection and analysis, large data set analysis and target language keyword search, digital forensic tool and script development, sector-level entity extraction, metadata extraction and analysis, network forensics and analysis.
Generates professional technical exploitation reports for customers and the Intelligence Community. Performs application and internet activities analysis to support source vetting, digital profiling, and other requirements. Coordinates, develops, and promulgates forensic and technical exploitation standards for IC/DHS assets while providing Subject Matter Expert-level technical support for DHS partners, internal/external customer, and DHS or partner deployed platforms.
Apply here and or submit resume addressing all in red (all) and submit to Joyce at frontdesk@beyondsof.com Titled “DHS Exploit”
Please register as Company to be able to access this Candidate's profile or email us frontdesk@beyondsof.com.