We have successfully partnered finding technical talent for one of our most forward thinking engineering partners. Their company is focused on using their their size and talent to create nimble and unique solutions in Software Engineering, Cyber Security, Modeling & Simulation, Data Science & Analytics, Machine Learning, Energy, and Power Systems.
Responsibilities:
Perform software development functions in support of the customer's Red Team mission to effectively portray opposition force Computer Network Attack, Computer Network Exploitation, and Computer Network Defense.
Define requirements and develop software solutions to those requirements based on observed and supplied feedback from Red Team events.
Maintain proficiency in Red Team operations through occasional support and/or observations of Red Team events.
Support mission and training events by creating new technical and non-technical solutions using an interdisciplinary approach to actively, and passively expose and exploit information system vulnerabilities.
Exploitation and vulnerability research, tool design and development (software/application/scripting/coding), support of Red Team operations, test lab configuration and administration, and other duties as assigned.
Experience with network and security-related protocols
Experience in using network protocol analyzers and sniffers, as well as the ability to decipher packet captures.
Emulate adversarial approaches.
Qualifications:
Candidate must have an active Secret clearance and the ability to obtain TS/SCI clearance.
Bachelor's degree from an accredited college or university in computer science, information systems, engineering, scientific or a mathematics-intensive discipline, or a Relevant Technical Discipline.
5-8 years of practical experience
Ability to program and script in C++, and C#
Excellent independent (self-motivational, organizational, personal project management) skills
Capable of conducting pentests on applications, systems and networks utilizing proven/formal processes and industry standards.
In-depth understanding of emerging threats, vulnerabilities, and exploits
Excellent problem-solving methodology, ability to break nebulous problems down into concrete tasks and execute those tasks to develop solutions
CEH and CISSP certifications are highly desired, but not required