Digital Network Exploitation Analyst; DNEA/FF
Listed on 2025-12-08
-
IT/Tech
Cybersecurity
Job Description
Point Blank is seeking a highly skilled and analytical Digital Network Exploitation Analyst (DNEA) to join our dynamic team. In this position, you will leverage advanced tools and methodologies to analyze, exploit, and interpret digital networks to support mission objectives. You will be identifying vulnerabilities, uncovering actionable intelligence, and collaborating with cross‑functional teams to provide critical insights.
Specific position responsibilities include:- Analyze and exploit digital network data
- Identify and report network vulnerabilities
- Conduct in-depth investigations into network activity
- Develop actionable intelligence from network analysis
- Maintain and optimize network exploitation tools
- Collaborate with teams to address mission requirements
If you have worked in one of the following analysis positions, please apply for this DNEA position:
Cyber Network Analyst, Digital Forensics Analyst, Network Exploitation Specialist, Cyber Operations Analyst, Signals Intelligence Analyst, Threat Intelligence Analyst, Network Vulnerability Analyst, Cybersecurity Engineer, Incident Response Analyst or Intrusion Detection Analyst.
- Must have, as a minimum, a TS/SCI CI Poly (Position requires full U.S. Citizenship) and be able to process as a Conditional Certificate of Access (CCA) candidate
- Bachelors degree in Cybersecurity, Computer Science, Information Technology, Data Analytics, Network Engineering, Information Systems, Software Engineering, Electrical Engineering, Intelligence Studies, Cyber Operations, etc.; or a Master’s degree or PhD in a qualified engineering field or a related discipline from an accredited college or university; or a high school diploma or GED. Your years of Intelligence Analysis experience will also determine your DNEA LCAT level for this job.
- Proficiency in network analysis tools
- Strong understanding of networking protocols
- Expertise in analyzing packet data
- Ability to identify and exploit system vulnerabilities
- Strong problem‑solving abilities
- Proficiency in scripting or automation tools
- Experience with advanced persistent threat (APT) analysis
- Knowledge of cryptographic protocols
- Familiarity with reverse engineering techniques
- Background in malware analysis
- Exposure to penetration testing frameworks
- Understanding of operational security principles
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).