Today
Secret
Mid Level Career (5+ yrs experience)
Occasional travel
Engineering - Electrical
Aberdeen Proving Ground, MD (On-Site/Office)
Intro: Work on a small team of cyber engineers to perform security assessments in search of vulnerabilities and identify mitigations. Conduct vulnerability assessments on web applications, networked devices, standalone software products, and other technologies as assigned using the penetration testing life cycle.
Qualifications:
• Offensive Security Certified Professional a must
• DoD 8570 IAT Level II certification (Security+ or equivalent).
• Intermediate knowledge of Linux and Windows internals.
• Thorough technical understanding of networking protocols, hardware, and software.
• Ability to interpret network traffic to understand communications and identify security vulnerabilities using Wireshark, Burp Suite, etc.
• Familiarity with hypervisor virtualization (VMware, VirtualBox, ESXi).
• Ability to effectively communicate through written and verbal means, to include conveying technical information to team members, leadership, and clients.
• Must be able to work in a secure SCIF lab setting (no phones, wireless or Bluetooth devices, outside technology permitted).
• Work efficiently both individually and as a team.
Desired:
• Basic cryptography knowledge.
• Basic programming / scripting experience (Python, Java, C/C++, bash).
• Code analysis and reverse engineering experience.
• Chip-off / Fault-injection / and similar hardware hacking knowledge
• Familiarity with COTS/GOTS radios, SDRs, and RF concepts.
Qualifications:
• Offensive Security Certified Professional a must
• DoD 8570 IAT Level II certification (Security+ or equivalent).
• Intermediate knowledge of Linux and Windows internals.
• Thorough technical understanding of networking protocols, hardware, and software.
• Ability to interpret network traffic to understand communications and identify security vulnerabilities using Wireshark, Burp Suite, etc.
• Familiarity with hypervisor virtualization (VMware, VirtualBox, ESXi).
• Ability to effectively communicate through written and verbal means, to include conveying technical information to team members, leadership, and clients.
• Must be able to work in a secure SCIF lab setting (no phones, wireless or Bluetooth devices, outside technology permitted).
• Work efficiently both individually and as a team.
Desired:
• Basic cryptography knowledge.
• Basic programming / scripting experience (Python, Java, C/C++, bash).
• Code analysis and reverse engineering experience.
• Chip-off / Fault-injection / and similar hardware hacking knowledge
• Familiarity with COTS/GOTS radios, SDRs, and RF concepts.
group id: 91164107