- Welcome to Planet Works, Inc. (PW)

Current Job Openings

Please note that all positions require a Top Secret clearance with at least a CI Polygraph. If interested, please mail your current resume to recruiting@planetworks.us.

Analytic Editor
Candidate must possess the following:
  • Active TS clearance with polygraph
  • AMOD tools experience
  • A bachelor’s degree plus eight (8) years of relevant experience
  • Additional work experience may be utilized to offset a lack of a degree
The ideal candidate for this position should possess the following skills:
  • Draft, review and edit and report end-product report and other intelligence products targeted for publication, briefings and presentation
  • Ensure the data complies with current policies and standards
  • Collaborate on and coordinate information internally and externally while ensuring document accuracy and mentor team members as the need arises
  • Strong background with SIGINT reporting and classifications

Cryptanalytic Computer Scientist
Candidate must possess the following:
  • Active TS clearance with polygraph
  • AMOD tools experience
  • A bachelor’s degree plus eight (8) years of relevant experience
  • Degree in Computer Science, Computer Engineering, Electrical Engineering, Mathematics, or a related field
  • Additional work experience or completion of JCAC (Joint Cyber Analysis Course) may be utilized to offset a lack of a degree
  • Relevant experience must be in a computer science area (i.e. theoretical or applied), designing/developing/using/evaluating mathematic models, methods, simulation/model development, methods, or techniques to study issues and solve problems, engineering (electrical or computer), or high-performance computing
The ideal candidate for this position should possess the following skills:
  • Create and utilize mathematical models and methods to study cryptographic systems, analyze vulnerabilities, and develop solutions to secure sensitive information
  • Design, develop, and evaluate algorithms and techniques to solve complex cryptographic and security-related problems
  • Participate in high-performance computing projects to optimize cryptographic processes and address security challenges as needed
  • Apply mathematical models and methods to study cryptographic systems, analyze vulnerabilities, and present solutions to secure sensitive information

Cryptologic Computer Scientist
Candidate must possess the following:
  • Active TS clearance with polygraph
  • AMOD tools experience
  • Strong computer science skills (operating systems, compiler theory, database theory, algorithm analysis, computer architecture, discrete math, programming language theory, and data structures) and ensure they are applied to each problem to provide state of the art techniques, tools, and approaches
  • A bachelor’s degree in Computer Science, Computer Engineering, Electrical Engineering, Mathematics, or a related field plus five (5) years of relevant experience
  • Additional work experience or completion of JCAC (Joint Cyber Analysis Course) may be utilized to offset a lack of a degree
  • Relevant experience must be in a computer science area (i.e. theoretical or applied), simulation/model development, designing/developing/using/evaluating mathematic models, methods, or techniques (e.g. algorithm or development) computation science, algorithm analysis and design, reverse engineering, or designing/developing computer and information systems, including engineering hardware or software
The ideal candidate for this position should possess the following skills:
  • Design, develop, deliver, and operate solutions to solve cryptologic computer science problems within a scientific framework
  • Create solutions derived from forensics and attack attribution and facilitate protection of critical networks and active systems
  • Utilize advanced techniques and tools to cover areas such as operating systems, algorithms, and data structures to tackle complex issues
  • Conduct knowledge discovery of passive and active systems, or other cryptologic computer science mission support

Data Scientist
Candidate must possess the following:
  • Active TS clearance with polygraph
  • AMOD tools experience
  • A bachelor’s degree plus three (3) years of relevant experience
  • A degree in Mathematics, Statistics, Machine Learning, Data Science, Computer Science is preferred
  • Additional work experience or completion of JCAC (Joint Cyber Analysis Course) may be utilized to offset a lack of a degree
  • Relevant experience must be in designing/implementing machine learning, data science, advanced analytical algorithms, programming (at least one high level language, e.g. Python), statistical analysis (e. variability, sampling error, interference)
The ideal candidate for this position should possess the following skills:
  • Proficient in Python and experienced in automating workflows, data manipulation, and visualization using Jupiter Notebooks
  • Use analytic modeling, statistical analysis, programming, or another appropriate scientific method to assess large datasets in various states of organization, cleanliness, and structure that account for the unique feature and limitations inherent in National Agency data holding
  • Translate practical mission needs and analytic questions related to large datasets into technical requirements and assist/collaborate with others to draw appropriate conclusions from the analysis of such data
  • Be able to communicate with people of various backgrounds, including individuals with non-technical audiences
  • Must be proficient in two or more of the following skill areas:
    1. Foundations: Mathematical, Computational, Statistical
    2. Data Processing: Data management and curation, data description and visualization, workflow and reproducibility
    3. Modeling, Inference, and Prediction: Data modeling and assessment, domain-specific consideration

Digital Network Exploitation Analyst
Candidate must possess the following:
  • Active TS clearance with polygraph
  • AMOD tools experience
  • A bachelor’s degree plus five (5) years of relevant experience
  • Degree in Computer Science, Computer Engineering, Electrical Engineering, Mathematics, or a related field
  • Additional work experience or completion of JCAC (Joint Cyber Analysis Course) may be utilized to offset a lack of a degree
The ideal candidate for this position should possess the following skills:
  • Ability to utilize all-source data to map target networks and assist in the development of detailed exploitation and operational plans
  • Possess a strong understanding of IP core infrastructure, communication devices, network connectivity and traffic patterns
  • Analyze SIGINT and cybersecurity data across various OSI network layers and develop new techniques to accommodate evolving technology
  • Newly developed techniques must be documented and shared with teammates, stakeholder, and intelligence consumers
  • Experience in computer or information systems design, development, or analysis
  • Demonstrate a background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or network and systems administration

Forensic Analyst Candidate must possess the following:
  • Active TS clearance with polygraph
  • AMOD tools experience
  • A bachelor’s degree plus eight (8) years of relevant experience
  • Degree in Computer Science, Computer Engineering, Electrical Engineering, Mathematics, or a related field
  • Additional work experience or completion of JCAC (Joint Cyber Analysis Course) may be utilized to offset a lack of a degree
The ideal candidate for this position should possess the following skills:
  • Experience with analyzing operating systems, networks and file systems
  • Expertise with digital forensic tools like EnCase
  • Extrapolate useful intelligence or enable mitigation of network vulnerabilities by analyzing captured media or investigating computer security incidents
  • Categorize network traffic as benign, suspicious, or malicious activity and document malicious tactics, techniques, and procedures (TTPs)

Intrusion Analyst
Candidate must possess the following:
  • Active TS clearance with polygraph
  • AMOD tools experience
  • One of the following DoD 8570 certifications are required (CISSP, CEH, Sec+, Net+, GIAC, GREM, CREA)
  • A bachelor’s degree plus eight (8) years of relevant experience
  • Degree in Computer Science, Computer Engineering, Electrical Engineering, Mathematics, or a related field
  • Additional work experience or completion of JCAC (Joint Cyber Analysis Course) may be utilized to offset a lack of a degree
The ideal candidate for this position should possess the following skills:
  • A bachelor’s degree plus eight (8) years of relevant experience
  • Analyze metadata collected from tasked communications systems to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis
  • Target digital network data to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources
  • Categorize network traffic as benign, suspicious, or malicious activity and document malicious tactics, techniques, and procedures (TTPs), and develop mitigation strategies to protect our systems
  • Develop and implement mitigation strategies

Reverse Engineer
Candidate must possess the following:
  • Active TS clearance with polygraph
  • AMOD tools experience
  • One of the following DoD 8570 certifications are required (CISSP, CEH, Sec+, Net+, GIAC, GREM, CREA)
  • A bachelor’s degree plus five (5) years of relevant experience
  • Degree in Computer Science, Computer Engineering, Electrical Engineering, Mathematics, or a related field
  • Additional work experience or completion of JCAC (Joint Cyber Analysis Course) may be utilized to offset a lack of a degree
The ideal candidate for this position should possess the following skills:
  • Analyze malicious binaries using various methods and determine functionality and indicators of compromise
  • Perform technical analysis of malicious binaries through controlled execution or static analysis of assembly code, overcoming techniques designed to defeat analysis
  • Assist with attribution to adversary infrastructure, and identification of indicators of compromise
  • Provide information and documentation that enables malware detection, signature creation, and mitigation

System Vulnerability Analyst
Candidate must possess the following:
  • Active TS clearance with polygraph
  • AMOD tools experience
  • A bachelor’s degree plus five (5) years of relevant experience
  • Degree in Computer Science, Computer Engineering, Electrical Engineering, Mathematics, or a related field
  • Additional work experience or completion of JCAC (Joint Cyber Analysis Course) may be utilized to offset a lack of a degree
The ideal candidate for this position should possess the following skills:
  • Zero Trust Experience is required
  • Identify vulnerabilities of and attacks to the design and operation of a system by relating vulnerabilities and attacks to effects on operations and missions supported by those systems
  • Compare and contrast various system attack techniques and develop operationally effective countermeasures
  • Produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the systems or missions being studied
  • Analyst should be comfortable with network analysis, network anomaly detection, IOC’s Mitre ATT@CK framework, and be able to analyze data to discover malicious or unauthorized activity collected from various sources

Target Analyst Reporter
Candidate must possess the following:
  • Active TS clearance with polygraph
  • AMOD tools experience
  • A bachelor’s degree plus six (6) years of relevant experience
  • Degree in Computer Science, Computer Engineering, Electrical Engineering, Mathematics, or a related field
  • Additional work experience or completion of JCAC (Joint Cyber Analysis Course) may be utilized to offset a lack of a degree
The ideal candidate for this position should possess the following skills:
  • Demonstrate significant experience with SIGINT reporting and collection
  • Able to demonstrate experience in areas related to the mission (e.g. cyber and intelligence analysis) or a similar mission in the DoD, or drafting/editing intelligence reports
  • Utilize appropriate reporting vehicles to research, analyze and report intelligence products for customers within the parameters of mission requirements
  • Maintain continuous awareness of internal and external customer needs and collaborate with collectors and analysts to refine collection and reporting requirements
  • Provide feedback to customers as appropriate
  • Issue appropriate products which relay development, trends, indications warnings or situational awareness regarding specific targets, as well as countermeasures and course of actions, if applicable
  • Perform pre-release quality control functions
  • Assist in developing databases or working aids on target activity to build target knowledge and improve collection

Target Digital Network Analyst (TDNA)
Candidate must possess the following:
  • Active TS clearance with polygraph
  • AMOD tools experience
  • A bachelor’s degree plus eight (8) years of relevant experience
  • Additional work experience or completion of JCAC (Joint Cyber Analysis Course) may be utilized to offset a lack of a degree
The ideal candidate for this position should possess the following skills:
  • Expertise with Ghidra or IDA Pro is helpful
  • Conduct advanced analysis of collection and open-source data to generate insights and leads, ensure target continuity, profile targets and their activities and develop techniques to gain additional target information
  • Maintain appropriate databases for targeting, tasking, and analysis
  • Employ multiple analysis disciplines such as pattern recognition against targets’ communications, network usage and digital footprints
  • Identify intelligence gaps to tailor current collection or enable new collection to close the gaps

Technical Writer
Candidate must possess the following:
  • Active TS clearance with polygraph
  • AMOD tools experience
  • A bachelor’s degree plus eight (8) years of relevant experience
  • Additional work experience may be utilized to offset a lack of a degree
The ideal candidate for this position should possess the following skills:
  • Prepare, review, revise and maintain technical documents including software and systems engineering, system operations, testing, and user documentation
  • Write and edit technical documentation for all the project’s hardware and software pertaining to installation, configuration, and how-to-documentation and create code documentation for software
  • Produce implementation guides and end-user guides for capabilities, provide field, data definition, and data flow documentation, and format technical publications from pamphlets, technical drawings, and consultations with technical personnel and other available resources

Systems Engineer
  • Openings at all levels with various types of required experience with a wide range of salaries that are commensurate with experience.
  • Requires a Top Secret clearance with at least a CI Polygraph.

System Administrator
  • Openings at all levels with various types of required experience with a wide range of salaries that are commensurate with experience.
  • Requires a Top Secret clearance with a FS Polygraph.