Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Assess intercepted data, reconstruct complex target networks, and pinpoint exploitable vulnerabilities. Develop targeted exploitation strategies by analyzing evolving communication technologies, metadata patterns, and network configurations to support intelligence objectives.

What You'll Do

Metadata Intelligence Analysis

Analyze intercepted metadata and content to identify critical intelligence, patterns, anomalies, and target communication behaviors.

Network Vulnerability Mapping

Reconstruct and document digital network structures, mapping target infrastructure to reveal vulnerabilities and exploitation pathways.

Technology Exploitation Strategies

Evaluate emerging communication technologies and network implementations to develop effective exploitation strategies and techniques.

Similar Roles

Target Analyst Reporter (DCWF 133)

DoD 8140: Cyber Effects

Synthesizes intelligence for reporting, evaluates SIGINT/cyber collection, collaborates with analysts, and maintains databases and customer feedback.

Explore learning path

Cyberspace Capability Developer (DCWF 341)

DoD 8140: Cyber Effects

Provides software and hardware support for cyberspace operations by identifying vulnerabilities and developing cyberspace effect capabilities.

Explore learning path

Network Analyst (DCWF 443)

DoD 8140: Cyber Effects

Analyzes network traffic and packet captures to detect anomalies and intrusions, while building advanced network detection rules and alerts.

Explore learning path

Cyberspace Operator (DCWF 322)

DoD 8140: Cyber Effects

Uses tools to conduct navigation, forensics, and recon in support of offensive cyber ops; performs actions on-net when authorized and directed.

Explore learning path

Host Analyst (DCWF 463)

DoD 8140: Cyber Effects

Conducts host system analysis using built-in tools, evaluating services, permissions, and configurations to detect and address system threats.

Explore learning path

Network Technician (DCWF 442)

DoD 8140: Cyber Effects

Supports Cyber Protection Team with infrastructure knowledge, mission scoping, and understanding of enterprise and tactical network systems.

Explore learning path

Exploitation Analyst (DCWF 121)

DoD 8140: Cyber Effects

Collaborates to identify access and collection gaps using cyber resources and techniques to penetrate target networks and support mission operations.

Explore learning path

Cyber Operations Planner (DCWF 332)

DoD 8140: Cyber Effects

Coordinates cyber operations plans, working with analysts and operators to support targeting and synchronization of actions in cyberspace.

Explore learning path

Need more guidance about cyber roles?

There are numerous different roles in cybersecurity and where you fit depends on your interest level. SANS New to Cyber offers courses, certifications, and free resources for anyone interested in getting started in cybersecurity.

Explore New to Cyber