Exploitation Analyst
Company: Dutch Ridge Consulting Group
Location: Norfolk
Posted on: February 19, 2026
|
|
|
Job Description:
Job Description Job Description Exploitation Analyst Contingent
Upon Contract Award Company Overview: Dutch Ridge Consulting Group,
LLC (DRCG), a United States (US) Small Business Administration
(SBA) Certified Service-Disabled Veteran-Owned Small Business
(SDVOSB) and ISO 9001:2015 Certified Company was established in
2016. DRCG is 100% US owned, has over 50 employees, and provides
high-quality support staff at ten client locations throughout the
US, with corporate offices in Ashburn, VA and Beaver, PA. DRCG
delivers expertise in Cybersecurity Engineering and Operations;
Cyber Threat Intelligence; Insider Threat Prevention and Detection;
Information Technology Solutioning; Systems Integration; Program
Management; Policy, Planning, Communications, and Compliance
Support; Workflow Solutioning; Risk Management; Business Process
Reengineering; and Professional Business Consulting Services.
DRCG's technical approach optimizes client investments by
leveraging expertise in managing growth and transformation of
existing IT environments. Develop or oversee development of
detailed plans that are executed by the Red Team or other
organizations supporting cyber OT&E events. Functions as a
subject matter expert in cyberspace operations and use all
available system documentation and intelligence sources to
determine system access points and critical components to develop
test objectives that are executed by a supporting red team.
Identify capability gaps and review cyber test requirements for
each system under test and research and coordinate with other DoD
organizations, academia, private sector and defense Contractors on
cyber capabilities and tools to meet the test requirements. Forward
proposed test requirements to the Government for review. Perform
these duties under the supervision of the 01D Future Operations
Officer. Support development and maintenance of cyber survivability
test planning templates, documents, and training courses as well as
instruct the courses. Support various OT&E working groups,
technical exchanges, and meetings. Duties and Responsibilities :
Serve as a Exploitation Analyst supporting cyber survivability
policy and process oversight to warfare divisions, and becoming
proficient in, and following cyber T&E concept of operations,
SOPs, policies, and guidance. Support sustainment and updating of
OPTEVFOR to conduct and instruct Cyber Survivability Test Planning
course. Inform 01D Future Operations Officer of any challenges and
issues in a timely manner for resolution Maintain and participate
in the development of 01D SOPs and OPTEVFOR Cyber test planning
documents to include participation in and support of the CCB
process. Pre-Test Planning: Support the Future Operations Officer
to determine overall test strategy and level of cyber OT&E for
acquisition programs. Support the Future Operations Officer in
reviewing Test and Evaluation Master Plan (TEMP) (or other types of
OT&E resourcing documents), Integrated Evaluation Framework
(IEF), test plan or other test planning related documents to ensure
adequate test strategies are established within policies and
guidelines to include adjudication of related comments from
stakeholders. Support program specific T&E Integrated Product
Team (IPT), cyber table tops and other internal or external events
as assigned and non-program specific T&E IPTs, technical
exchange meetings, and other briefs and meetings as required. Test
Planning: Develop cyber survivability test plans following Cyber
OT&E procedures and templates and with minimal administrative
errors. Coordinate with the warfare divisions and red team
operators to ensure defined test objectives are comprehensive and
executable, data collection requirements are adequately defined,
cyber test capabilities are identified, resourced, and integrated
prior to the test plan being signed. Attend test planning visits in
support of cyber OT&E planning. Lead preparation of test
execution, including: Participate in site pre-test coordination
visits. Provide an in brief to the test site. Conduct Pre-Execution
Brief to 01D leadership. Prepare library of data needed for test
and arrange for its arrival at the test site. Ensure all
deconfliction requirements are met prior to test execution in
accordance with JFHQ DoDIN and Navy Cyber Defense Operations
Command guidance Lead execution of cyber OT&E related test
events as assigned, supporting cooperative vulnerability
penetration assessments and adversarial assessments in accordance
with DoD guidance and Cyber OT&E policies, guidance and
procedures. Coordinate with the OTD, site personnel, program office
SMEs, and supporting red teams. Ensure test are conducted safely
and OPTEVFOR policies are adhered to. Follow JFHQ-DODIN
deconfliction procedures Verify collected data for accuracy and
completeness. Conduct daily hotwashes during test and submit a
daily summary report to the OTD and 01D leadership. Ensure all test
objectives are completed Post-Test: Support the Future Operations
Officer during the post-test process to ensure traceability between
test objectives, collected data, and post-test deliverables.
Coordinate with the OTD to set up post-test meetings. Participate
in post-test processes including data upload, scoring board, 01D
Review Board, CEWG, SERB, and E-SERB. Lead generation of final
report products to ensure the information is technically accurate
following Cyber OT&E procedures and templates and with minimal
administrative errors. This includes, drafting of the Data Analysis
Summary and Results Enclosure, and reviewing Blue/Gold Sheets
drafted by Red Team Operators. Knowledge of basic physical computer
components and architectures, including the functions of various
components and peripherals (e.g., CPUs, Ns, data storage). Ability
to create comprehensive exploitation strategies that identify
exploitable technical or operational vulnerabilities. Ability to
collaborate effectively with others. Ability to communicate complex
information, concepts, or ideas in a confident and well-organized
manner through verbal, written, and/or visual means. Knowledge of
internet network addressing (IP addresses, classless inter-domain
routing, TCP/UDP port numbering). Ability to identify/describe
target vulnerability. Knowledge of a wide range of basic
communications media concepts and terminology (e.g., computer and
telephone networks, satellite, cable, wireless). Knowledge of
attack methods and techniques (DDoS, brute force, spoofing, etc.).
Knowledge of basic malicious activity concepts (e.g., foot
printing, scanning and enumeration). Knowledge of common networking
devices and their configurations. Knowledge of concepts for
operating systems (e.g., Linux, Unix). Knowledge of data
communications terminology (e.g., networking protocols, Ethernet,
IP, encryption, optical devices, removable media). Knowledge of how
hubs, switches, routers work together in the design of a network.
Knowledge of how internet applications work (Simple Mail Transfer
Protocol (SMTP) email, web-based email, chat clients, voice over
IP). Knowledge of Internet and routing protocols. Knowledge of
network security (e.g., encryption, firewalls, authentication,
honey pots, perimeter protection). Knowledge of the basic
structure, architecture, and design of modern communication
networks. Skill in recognizing technical information that may be
used for leads to enable remote operations (data includes users,
passwords, email addresses, IP ranges of the target, frequency in
DNI behavior, mail servers, domain servers, SMTP header
information). Knowledge of front-end collection systems, including
traffic collection, filtering, and selection. Perform analysis for
SUT infrastructure exploitation activities. Collaborate with other
internal and external partner organizations on target access and
operational issues. Conduct analysis of physical and logical
digital technologies (e.g., wireless, supervisory control and data
acquisition, telecom) to identify likely avenues of access. Lead or
enable exploitation operations in support of organization
objectives and target requirements. Maintain awareness of
advancements in hardware and software technologies (e.g., attend
training or conferences, reading) and their likely implications.
Ability to accurately and completely source all data used in
intelligence, assessment and/or planning products. Ability to
develop or recommend analytic approaches or solutions to problems
and situations for which information is incomplete or for which no
precedent exists. Ability to evaluate, analyze, and synthesize
large quantities of data (which may be fragmented and
contradictory) into high quality, fused targeting/intelligence
products. Knowledge of both internal and external customers and
partner organizations, including information needs, objectives,
structure, capabilities, etc. Knowledge of client organizations,
including information needs, objectives, structure, capabilities,
etc. Knowledge of common reporting databases and tools. Knowledge
of all relevant reporting and dissemination procedures. Knowledge
of strategies and tools for target research. Knowledge of
organizational and partner policies, tools, capabilities, and
procedures. Knowledge of organizational and partner authorities,
responsibilities, and contributions to achieving objectives. Skill
in creating plans in support of remote operations. Skill in
generating test plans in support of mission requirements. Skill in
analyzing network device configurations. Skill in assessing system
under test security posture. Skill in documenting the execution and
results in conducting a cyber OT&E event. Ability to
incorporate OPTEVFOR Red Team infrastructure and capabilities into
OT&E test objective development. Knowledge of the basic
structure, architecture, design, and vulnerabilities of
communications systems. Knowledge of virtualized and cloud-based
systems. Qualifications/Requirements : TS/SCI clearance Bachelor's
degree in computer science, cybersecurity, or related technical
degree OR minimum 5 years' experience in DoD defensive or offensive
cyberspace operations planning or exploitation analysis Proficiency
in decomposing complex computer systems/networking configurations
in support of system exploitation analysis Proficiency in Microsoft
Office Applications (MS Visio, Project, Excel, PowerPoint etc.)
Ability to perform detail-oriented work quality assurance/quality
control prior to delivery to the government. Excellent written and
oral communications skills to support briefing senior leadership
(O6/GS-15 or higher) Job Location : Norfolk, VA 23505 DRCG, LLC. is
an Equal Opportunity/Affirmative Action employer. All qualified
applicants will receive consideration for employment without regard
to race, color, religion, sex, national origin, or any other
criteria the consideration of which is made impermissible by
applicable law. Job Posted by ApplicantPro
Keywords: Dutch Ridge Consulting Group, Hampton , Exploitation Analyst, IT / Software / Systems , Norfolk, Virginia