KEYW Corporation

  • Data Exploiter

    Job Locations 5 months ago(8/27/2018 2:47 PM)
    # of Openings
    Posted Date
    Job Locations
  • Responsibilities

    Data Exploiter will be responsible for:

    • Performing all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. This is an engineering analyst position responsible for reviewing large data sets to identify vulnerabilities and hostile activity. The professional should be able to produce reports, and present briefings regularly on findings, interact with other customer organizations and help refine tools and measures.
    • Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents.
    • Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
    • Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
    • Evaluate firewall change requests and assess organizational risk.
    • Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.
    • Assists with implementation of counter-measures or mitigating controls.
    • Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
    • Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.
    • Prepares incident reports of analysis methodology and results.
    • Provides guidance and work leadership to less-experienced technical staff members.
    • Maintains current knowledge of relevant technology as assigned.
    • Participates in special projects as required.


    Minimum requirements include:



    Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience.


    5-8 years of related experience in data security administration.

    Required:Forensic and malware, intrusion detection, network analysis, or reverse engineering experience

    Preferred  qualifications:

    • Penetration testing, Pen testing, pen tester, penetration tester
    • Malware analysis, IDAPro,
    • Network analysis
    • SANS Training (e.g., Forensics series 408, 508; Malware reverse engineering 610; Security 560, 660, 760; network or memory forensics 572; Certified Intrusion Analyst 503).
    • Encase training & cert
    • Programming C++, C, Java, other languages and platforms
    • CISSP
    • Red Hat

    Clearance Requirement: This position requires a Top Secret/SCI with POLY security clearance, based on current background investigation (SBI), as well as the favorable completion of polygraph.  Clearance and polygraph processing will be completed by the U.S. Government.


    How to Apply?

    Please click apply on the right.

    About the Organization

    KeyW is a pure-play national security solutions provider for the Intelligence, Cyber and Counterterrorism Communities' toughest challenges. We support the collection, processing, analysis and dissemination of information across the full spectrum of their missions. We employ and challenge more than 2,000 of the most talented professionals in the industry with solving such complex problems as preventing cyber threats, transforming data into intelligence and combating global terrorism.


    KeyW, together with its direct and indirect subsidiaries, encourages and actively supports a policy of Equal Employment Opportunity and commits to provide equal opportunity to each individual, regardless of race, color, religion, gender, sexual orientation, age, national origin or ancestry, marital status, veteran status, disability or any other classifications protected by Federal, State or local law. In fact, we foster an environment that promotes diversity, balance and fun—because we believe in the importance of having a workplace as unique as the challenges we solve.



    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share to your network!

    Need help finding the right job?

    We can recommend jobs specifically for you! Click here to get started.