

Cornerstone Defense
Data Exploiter
β - Featured Role | Apply direct with Data Freelance Hub
This role is for a Data Exploiter in Chantilly, VA, offering a competitive pay rate for a contract length of "X months." Key skills include network traffic analysis, vulnerability risk assessments, and proficiency with tools like Splunk and Wireshark.
π - Country
United States
π± - Currency
Unknown
-
π° - Day rate
Unknown
-
ποΈ - Date
March 6, 2026
π - Duration
Unknown
-
ποΈ - Location
On-site
-
π - Contract
Unknown
-
π - Security
Unknown
-
π - Location detailed
Chantilly, VA
-
π§ - Skills detailed
#"ETL (Extract #Transform #Load)" #IP (Internet Protocol) #Scripting #Linux #Risk Analysis #Metadata #Security #Documentation #Splunk #Monitoring #Datasets #Data Science
Role description
Data Exploiter Chantilly, VA The Data Exploiter analyzes large, unstructured datasets to support operational targeting and analytical requirements. You will manage the entire data life cycleβfrom collection and triage to vulnerability assessment and the dissemination of actionable intelligence. Key Responsibilities
Extract and analyze foreign intelligence/counterintelligence value from digital data; assist with cyber attribution efforts.
Conduct log analysis, network traffic monitoring, and vulnerability risk assessments to detect breaches and anomalies.
Develop tailored intelligence products, entity profiles, and derive datasets to drive targeting and operations.
Create new methodologies/algorithms for data correlation; recommend new technologies to improve team performance.
Maintain technical documentation and collaborate cross-functionally with data scientists, engineers, and developers.
Required Qualifications
Experience in network traffic analysis, detailed log analysis, and system monitoring.
Proven ability in vulnerability identification, risk analysis, remediation, and evaluating worldwide security events (Zero Days, cyber-attacks).
Ability to sift through large unstructured datasets to identify/correlate key metadata, artifacts, and critical information gaps.
Knowledge of incident response, containment, mitigation, and common cyber-attack methods.
Experience with technical collection abilities and the full targeting life cycle.
Desired Qualifications
Proficient with network monitoring tools (Splunk, Wireshark, SolarWinds, WSUS, Snare) and OS hardening (CIS-CAT).
Strong understanding of VPNs, VLANs, TCP/IP, and Linux OS.
Experience using scripting to exploit large data sets.
Technical targeting experience; ability to navigate enterprise security accreditation processes; capable of working independently.
Data Exploiter Chantilly, VA The Data Exploiter analyzes large, unstructured datasets to support operational targeting and analytical requirements. You will manage the entire data life cycleβfrom collection and triage to vulnerability assessment and the dissemination of actionable intelligence. Key Responsibilities
Extract and analyze foreign intelligence/counterintelligence value from digital data; assist with cyber attribution efforts.
Conduct log analysis, network traffic monitoring, and vulnerability risk assessments to detect breaches and anomalies.
Develop tailored intelligence products, entity profiles, and derive datasets to drive targeting and operations.
Create new methodologies/algorithms for data correlation; recommend new technologies to improve team performance.
Maintain technical documentation and collaborate cross-functionally with data scientists, engineers, and developers.
Required Qualifications
Experience in network traffic analysis, detailed log analysis, and system monitoring.
Proven ability in vulnerability identification, risk analysis, remediation, and evaluating worldwide security events (Zero Days, cyber-attacks).
Ability to sift through large unstructured datasets to identify/correlate key metadata, artifacts, and critical information gaps.
Knowledge of incident response, containment, mitigation, and common cyber-attack methods.
Experience with technical collection abilities and the full targeting life cycle.
Desired Qualifications
Proficient with network monitoring tools (Splunk, Wireshark, SolarWinds, WSUS, Snare) and OS hardening (CIS-CAT).
Strong understanding of VPNs, VLANs, TCP/IP, and Linux OS.
Experience using scripting to exploit large data sets.
Technical targeting experience; ability to navigate enterprise security accreditation processes; capable of working independently.






