Posted today
Top Secret/SCI
Mid Level Career (5+ yrs experience)
Unspecified
IT - Security
Norfolk, VA (On-Site/Office)
BreakPoint Labs is seeking an Exploitation Analyst to function as a subject matter expert in cyberspace operations and develop cyber operation assessment plans.
Responsibilities include:
- Developing or overseeing the development of detailed plans executed by the red team in support of Cyber OT&E events.
-Utilizing system documentation and intelligence sources to determine system access points and critical components to develop test objectives.
- Identifying capability gaps, reviewing cyber test requirements, and coordinating with DoD organizations, academia, and the private sector on cyber capabilities and tools.
- Supporting the development and maintenance of cyber survivability test planning templates, documents, and training courses, as well as instructing these courses.
- Developing cyber survivability test plans.
- Leading the execution of Cyber OT&E related test events, such as cooperative vulnerability penetration assessments and adversarial assessments.
- Conducting daily hotwashes during testing and submitting daily summary reports to leadership.
- Leading the generation of final report products.
- Analyzing physical and logical digital technologies (e.g., wireless, supervisory control and data acquisition, telecom) to identify likely avenues of access.
- Collaborating with other internal and external partner organizations on target access and operational issues.
Required Experience, Duration and Focus:
- Minimum of 5 years’ experience in DoD defensive or offensive cyberspace operations planning or exploitation analysis (OR a Bachelor’s Degree in a related technical field).
- Technical Proficiency: Proficiency in decomposing complex computer systems/networking configurations in support of system exploitation analysis.
- Proficiency in Microsoft Office Applications (MS Visio, Project, Excel, PowerPoint, etc.).
- Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).
- Knowledge of attack methods (DDoS, brute force, spoofing) and malicious activity concepts (foot printing, scanning, enumeration).
- Knowledge of operating systems (e.g., Linux, Windows) and common networking devices.
- Knowledge of internet applications (SMTP, web-based email, chat clients, VoIP) and routing protocols.
- Skill in recognizing technical information useful for remote operations, such as passwords, IP ranges, and DNI behavior.
- Knowledge of attack methods (DDoS, brute force, spoofing) and malicious activity concepts (foot printing, scanning, enumeration).
- Knowledge of operating systems (e.g., Linux, Windows) and common networking devices.
- Knowledge of internet applications (SMTP, web-based email, chat clients, VoIP) and routing protocols.
- Skill in recognizing technical information useful for remote operations, such as passwords, IP ranges, and DNI behavior.
Required Certifications: Security+ Continuing Education (CE) [CompTIA]. Prefer the Offensive Security Certified Professional (OSCP) [Off Sec]
Security Clearance Required: Top Secret / SCI
Education Required: Bachelor’s Degree in the Area(s) of Study of Computer Science, Cybersecurity, or related technical degree.
Responsibilities include:
- Developing or overseeing the development of detailed plans executed by the red team in support of Cyber OT&E events.
-Utilizing system documentation and intelligence sources to determine system access points and critical components to develop test objectives.
- Identifying capability gaps, reviewing cyber test requirements, and coordinating with DoD organizations, academia, and the private sector on cyber capabilities and tools.
- Supporting the development and maintenance of cyber survivability test planning templates, documents, and training courses, as well as instructing these courses.
- Developing cyber survivability test plans.
- Leading the execution of Cyber OT&E related test events, such as cooperative vulnerability penetration assessments and adversarial assessments.
- Conducting daily hotwashes during testing and submitting daily summary reports to leadership.
- Leading the generation of final report products.
- Analyzing physical and logical digital technologies (e.g., wireless, supervisory control and data acquisition, telecom) to identify likely avenues of access.
- Collaborating with other internal and external partner organizations on target access and operational issues.
Required Experience, Duration and Focus:
- Minimum of 5 years’ experience in DoD defensive or offensive cyberspace operations planning or exploitation analysis (OR a Bachelor’s Degree in a related technical field).
- Technical Proficiency: Proficiency in decomposing complex computer systems/networking configurations in support of system exploitation analysis.
- Proficiency in Microsoft Office Applications (MS Visio, Project, Excel, PowerPoint, etc.).
- Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).
- Knowledge of attack methods (DDoS, brute force, spoofing) and malicious activity concepts (foot printing, scanning, enumeration).
- Knowledge of operating systems (e.g., Linux, Windows) and common networking devices.
- Knowledge of internet applications (SMTP, web-based email, chat clients, VoIP) and routing protocols.
- Skill in recognizing technical information useful for remote operations, such as passwords, IP ranges, and DNI behavior.
- Knowledge of attack methods (DDoS, brute force, spoofing) and malicious activity concepts (foot printing, scanning, enumeration).
- Knowledge of operating systems (e.g., Linux, Windows) and common networking devices.
- Knowledge of internet applications (SMTP, web-based email, chat clients, VoIP) and routing protocols.
- Skill in recognizing technical information useful for remote operations, such as passwords, IP ranges, and DNI behavior.
Required Certifications: Security+ Continuing Education (CE) [CompTIA]. Prefer the Offensive Security Certified Professional (OSCP) [Off Sec]
Security Clearance Required: Top Secret / SCI
Education Required: Bachelor’s Degree in the Area(s) of Study of Computer Science, Cybersecurity, or related technical degree.
group id: 90987816