Seeking a Cybersecurity Operations expert to provide support for Client computer network projects in the areas of Systems Engineering, Project Integration, Deployment and Operations, Operational Formation and Leadership, Risk and Strategy Management, Data Analysis, and Network Analysis and Exploitation.
Specific responsibilities include:
Draft network Concept of Operations for approval, perform network risk analyses, technical and analytic support, attending periodic strategic review programs, Facilitate the management of the technical areas, Attending, inspecting, and witnessing Client testbed facility exercises, Suggesting functional modifications to Client testbeds to more accurately simulate realistic scenarios, Develop technical requirements for long-term strategic programs, Review, critique, and summarize experimental test plans and technical development reports, Provide scientific guidance on technical approaches , Document technical assumptions based upon current information and best-practices, Review vendor proposals and provide selection guidance for Client, Participate in review boards to provide Client management with actionable information, Communicate technical updates to all Client shareholders, Review internal reporting documents to stay current on changing information, Serve on multidisciplinary technical panels for brainstorming activities, Attend pertinent working group sessions to stay informed on current policy guidance, Convey highly technical information in a simplified format to best inform management and policy makers, Participate in readiness exercises to train Client staff in processes and procedure, Identify work environment-specific quality control/quality assurance procedures and Familiarize Client to unfamiliar or novel research topics.
Key areas of focus include:
• Reverse Engineering
• Vulnerability Research
• Wireless and Network Communications
• Constraint Solving
• Exploitation techniques
Candidates must be able to think offensively, both defeating and developing new and advanced hardware, firmware, and software exploitation techniques. Projects will be undertaken in small teams with close coordination with customers to quickly enhance capabilities or resolve issues in existing tools.
Information capture continues to be a growth industry and we are constantly looking to find the right candidates who can do this challenging work.
Any Graduate