Mid- Level Mobile Exploitation Analyst

Intelligence Analysis Bethesda, Maryland


In providing Mobile Exploitation Analyst support, the Contractor shall provide some or all of services as required:

  • Conduct forensic examination of High Priority Digital Media derived from mobile devices to include:
    • Full-Scope forensic examinations
    • Advanced registry and Internet history analysis
    • Steganography detection and analysis
    • Large data set analysis and Target language Keyword search
    • Forensic tool and script development
    • Sector-level entity extraction
    • Metadata extraction and analysis
    • Network forensics and analysis
    • Generate forensic reports of interest to OTE customers and the Intel Community
    • Perform application and internet activities analysis to support source vetting, digital profiling, and other requirements
    • Apply reverse engineering techniques to detect and identify malware
    • Coordinate, develop and promulgate forensic and technical exploitation standards for forward deployed IC/DoD assets
    • Provide technical support for federated partners, internal customer, and NMEC deployed platforms
    • Provide global Technical Exploitation response capabilities to include:
    • Provide deployable technical exploitation personnel to meet DOD & partner contingency requirements
    • Provide expert multi-functional exploitation expertise as required
    • Coordinate with NMEC Operations on MEDEX/CELLEX/VIDEX platform & training related issues
    • Plan, Integrate & Execute full-spectrum technical exploitation plans, exercises, training and operations as required
    • Assist in the conduct of Site Exploitation (SE) activities as required
    • Provide technical support to field collection and other operational partner elements to include:
    • Diverse set of technical exploitation tools & tradecraft
    • Hardware Exploitation
    • Firmware Exploitation
    • Assist asset validation & credibility assessments by providing baseline assessments of digital media and cellular telephones


  • Must have a Bachelor's degree in Computer Science or STEM discipline and at least four (4) years of related experience.
  • Minimum of 2 years of demonstrated technical exploitation experience and skills such as computer forensics, DOMEX, reverse engineering, and malware analysis
  • Experience designing, implementing and documenting computer forensics services to include evidence seizure, computer forensic analysis and data recovery
  • Experience conveying technical information effectively and concisely to a wide range of audiences
  • One or more industry-standard forensic certifications (EnCe, ACE, CCFE, GCFH, GCFE, GASF. CCE)
  • Working experience in hardware configuration and network/data communications
  • Working experience with software engineering and scripting
  • Working experience in database technology and database exploitation/forensics
  • Working experience in law enforcement evidence seizure
  • Working experience conducting intelligence analysis and writing finished intelligence reporting

 Security Clearance:

  • Current TS/SCI with CI Poly