Software Exploit Developer Junior with Security Clearance Information Technology (IT) - Alexandria, VA at Geebo

Software Exploit Developer Junior with Security Clearance

Valiant Integrated Services has an exciting opportunity for a Software Exploit Development Junior supporting the Defense Threat Reduction Agency's (DTRA) Advance Red Cyber program in executing Red Team AssessmentsRed Teams perform assessments from an adversarial viewpoint and use the full spectrum of identified adversarial capabilities, limited only by restrictions mandated by the customer and legal, safety, and security constraints, to test and evaluate protection strategies and demonstrate exploitation of identified vulnerabilitiesThe Software Exploit Developer Junior will have the opportunity to create new and innovative tools for Red Cyber team Operators to use in cyber assessment operations of U.
SGovernment and DoD critical networksKey
Responsibilities:
o Develop tools, exploits, and code for use on red cyber operationsConduct open-source research on cyber related vulnerabilities and exploitation developmento Expertise as a Reverse engineer analyzing source code to develop tools or exploitso Expertise with Script or develop in one or more language (e.
g.
, C, C++)o Performing code review on all offensive scripts/code and shepherding them through all approval processeso Analyze operational Techniques Tactics and Procedures (TTPs) and developing exploits and scripts to automate and improve operational processesThese products will help to better emulate adversarial threats and attacks and demonstrate and exploit vulnerabilities to sensitive mission critical networks and systemso Document safe and secure usage for internally and externally developed tools IAW Red Team policies and procedureso Support and/or conduct Dev Ops review of code for operational approvalo Leverage existing proof of concept code to build and tailor exploits for use in Command and Control (C2) toolso Support the development and tuning of C2 tools to enhance effectiveness and reduce detection likelihoodo Support urgent development requests as required in support of assessmentsTailored tools and exploits may require assembly, testing, and approval within 24 hours of identifying a vulnerabilityMinimum
Qualifications:
o Bachelor's Degree or relevant work experience o Has managed significant engagements o Typically 3
years of related experience o All applicants must be able to complete pre-employment onboarding requirements (if selected) which may include any/all of the following:
criminal/civil background check, drug screen, and motor vehicle records search, in compliance with any applicable laws and regulationso Top Secret Security Clearance required o TS/SCI Security Clearance preferred Work Environment/Physical Demands:
o Hybrid work schedule - 4 days in office, 1 remote o Typical office environment, extensive domestic and international travel, extreme weather conditionsSitting, walking, talking, hearing, reading, writing, keyboarding, driving, filing, reaching, stooping, crouching, bending, standing for extended periods of time, lifting or carrying up to 40 poundsEqual Opportunity Employer Minorities/Women/Protected Veterans/Disabled Recommended Skills Assessments Automation C+
(Programming Language) Filing Open Source Technology Sensitive Compartmented Information (Sci Clearance) Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.