Digital Network Exploitation Analyst 4

Posted:
10/24/2024, 5:33:19 AM

Location(s):
San Angelo, Texas, United States ⋅ Texas, United States

Experience Level(s):
Senior

Field(s):
IT & Security

Workplace Type:
On-site

At Wyetech, you’ll be at the center of an award-winning corporate culture, breaking technological barriers and solving real-world problems for our federal government customers. We are committed to hiring the best of the best, and in return, we offer a world-class, truly unique employee experience that is rare within our industry.

Use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment.

Due to federal contract requirements, United States Citizenship and position appropriate security clearance is required. (e.g. Active TS/SCI security clearance with agency appropriate polygraph).
Wyetech, LLC is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. 

Affirmative Action Statement:
Wyetech, LLC is committed to the principles of affirmative action in all hiring and employment for minorities, women, individuals with disabilities, and protected veterans.

Accommodations:
Wyetech, LLC is committed to providing an inclusive and accessible hiring process. If you need any accommodations during the application or interview process, please contact David Schroeder, Jr. at 844-WYETECH x727 or [email protected]. We are happy to provide reasonable accommodations to ensure equal access to all candidates. 

Wyetech

Website: https://wyetechllc.com/

Headquarter Location: Odenton, Maryland, United States

Employee Count: 11-50

Year Founded: 2007

IPO Status: Private

Industries: Analytics ⋅ Cloud Computing ⋅ Cyber Security ⋅ Information Technology ⋅ Software