×
Register Here to Apply for Jobs or Post Jobs. X

Data Exploiter; TS​/SCI Poly at GDIT Chantilly, Loudoun County, VA

Job in Virginia, St. Louis County, Minnesota, 55792, USA
Listing for: Itlearn360
Full Time position
Listed on 2025-12-27
Job specializations:
  • IT/Tech
    Cybersecurity, Data Security, Information Security
Salary/Wage Range or Industry Benchmark: 136000 - 184000 USD Yearly USD 136000.00 184000.00 YEAR
Job Description & How to Apply Below
Position: Data Exploiter (TS/SCI with Poly Required) at GDIT Chantilly, Loudoun County, VA

Data Exploiter (TS/SCI with Poly Required) job ntilly, Loudoun County, VA.

Location: USA VA Chantilly

Job Req: RQ210357

Clearance Level Must Currently Possess: Top Secret SCI + Polygraph

Clearance Level Must Be Able to Obtain: Top Secret SCI + Polygraph

Job Family: IT Infrastructure and Operations

Skills: Analytical Thinking, Documentation, Log Analysis, Open Source Intelligence

Certifications: None

Experience: 5+ years of related experience

US Citizenship

Required:

Yes

Job Description

A qualified Data Exploiter reviews, manipulates, triages, and analyzes large datasets and collections. Candidate is responsible for supporting operational and analytical requirements. Activities include detailed log analysis, network traffic monitoring, and vulnerability risk assessment. The individual will conduct assessments of software tools and systems to identify vulnerabilities and work with internal and external technical stakeholders to enrich analysis. Able to follow the entire targeting life cycle by engaging in data exploitation of requirements collection, data analysis, summary and documentation, and actionable information dissemination.

Key Responsibilities
  • Track and monitor cyber actors, their activities, and infrastructure to identify potential threats and vulnerabilities.
  • Utilize industry-standard commercial and open-source tools for threat intelligence gathering and analysis.
  • Conduct proactive threat hunting to uncover malicious activity, indicators of compromise (IOCs), and tactics, techniques, and procedures (TTPs).
  • Chain cyber threat events across multiple data sources to build coherent threat narratives and timelines.
  • Analyze network traffic, logs, and endpoints to identify malicious behaviors and anomalous activities.
  • Develop actionable intelligence reports and briefings for both technical and non-technical stakeholders.
  • Collaborate with incident response, SOC, and other security teams to correlate findings and provide context.
  • Maintain an understanding of emerging cyber threats and trends, adjusting hunting techniques accordingly.
  • Communicate threat findings and intelligence through clear, concise briefings and visualizations.
Education and Experience
  • Bachelor's degree in computer science, information technology, or other related discipline, or equivalent combination of education, technical certifications, training, and work/military experience.
Required Qualifications
  • Strong knowledge of common cyber attack methodologies (e.g., MITRE ATT&CK, kill chain models).
  • Strong knowledge of TCP/IP communications.
  • Proficiency with commercial and open-source threat intelligence tools, such as:
  • SIEM (e.g., Splunk, Elastic Stack)
  • Network traffic analysis tools (e.g., Zeek, Suricata, Wireshark)
  • Threat intelligence platforms (e.g., Threat Connect, Anomali)
  • OSINT tools (e.g., Maltego, Shodan, Censys)
  • Endpoint detection and response (EDR) tools (e.g., Crowd Strike, Carbon Black)
  • Malware analysis tools (e.g., Virus Total, Hybrid Analysis)
  • Strong analytical skills to identify patterns, anomalies, and relationships between cyber threat events.
  • Ability to articulate complex technical findings in clear, accessible briefings and reports.
  • Strong written and verbal communication skills, with an emphasis on briefing senior leadership and non-technical stakeholders.
  • Experience in creating threat intelligence reports and providing actionable recommendations.
Desired Qualifications
  • Understanding of malware behaviors and basic reverse engineering concepts.
  • Experience with automated threat hunting and scripting (e.g., Python, Power Shell).
  • Familiarity with cloud environments (e.g., AWS, Azure) and associated cyber threats.
  • Experience in a Security Operations Center (SOC) or Incident Response role.
  • Experience extracting information of foreign intelligence, counterintelligence and targeting value from digital data.
  • Experience producing products that inform operations, drive targeting and collection, contribute to intelligence products, and support multiple customer needs.
Benefits and Compensation

The likely salary range for this position is $136,000 - $184,000. This is not, however, a guarantee of compensation or salary. Salary will be based on experience, geographic location and possibly contractual requirements.

Travel Required:

None

Telecommuting Options:
Onsite

Scheduled Weekly

Hours:

40

Work Location:

USA VA Chantilly

PI

#J-18808-Ljbffr
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary