Description

Job Description

Seeking a Cybersecurity Operations expert to provide support for Client computer network projects in the areas of Systems Engineering, Project Integration, Deployment and Operations, Operational Formation and Leadership, Risk and Strategy Management, Data Analysis, and Network Analysis and Exploitation.

Specific responsibilities include:
Draft network Concept of Operations for approval, perform network risk analyses, technical and analytic support, attending periodic strategic review programs, Facilitate the management of the technical areas, Attending, inspecting, and witnessing Client testbed facility exercises, Suggesting  functional modifications to Client testbeds to more accurately simulate realistic scenarios,  Develop technical requirements for long-term strategic programs, Review, critique, and summarize experimental test plans and technical development reports, Provide scientific guidance on technical approaches , Document technical assumptions based upon current information and best-practices, Review vendor proposals and provide selection guidance for Client,  Participate in review boards to provide Client management with actionable information, Communicate technical updates to all Client shareholders, Review internal reporting documents to stay current on changing information, Serve on multidisciplinary technical panels for brainstorming activities, Attend pertinent working group sessions to stay informed on current policy guidance, Convey highly technical information in a simplified format to best inform management and policy makers, Participate in readiness exercises to train Client staff in processes and procedure, Identify work environment-specific quality control/quality assurance procedures and  Familiarize Client to unfamiliar or novel research topics.

Key areas of focus include: 
• Reverse Engineering
• Vulnerability Research
• Wireless and Network Communications
• Constraint Solving
• Exploitation techniques
Candidates must be able to think offensively, both defeating and developing new and advanced hardware, firmware, and software exploitation techniques. Projects will be undertaken in small teams with close coordination with customers to quickly enhance capabilities or resolve issues in existing tools.
Information capture continues to be a growth industry and we are constantly looking to find the right candidates who can do this challenging work.

 

  • TS/SCI with favorable polygraph
  • Proficient in one or more assembly languages (x86, ARM, etc)
  • Expertise in one or more scripting languages (e.g., Python or Ruby)
  • Software development experience in C/C++
  • Detailed understanding of and experience in Vulnerability Research (VR) / Reverse Engineering (RE)
  • Proficiency with disassemblers / debuggers  (e.g., IDA Pro, GDB, Windbg)
  • Bachelors degree plus 12 years of technical experience.  Additional experience may be substituted in lieu of degree.
  • Familiarity with PE/ELF file formats, linkers, and compilers
  • Experience solving Capture-the-Flag (CTF) challenges
  • Experience developing and/or reversing Software Protection / Obfuscation techniques
  • Embedded development/reverse engineering experience
  • Strong understanding of and experience with cryptographic protocols

Education

Any Graduate