Get more qualified candidates and reduce your costs with our guaranteed recruiting solutions

Talk to an expert today

CLOSED - 2670 - Cyber Security SME

McLean, Virginia
Full Scope Polygraph

OVERVIEW:


We are seeking a Cybersecurity Operations expert to provide support for Client computer network projects in the areas of Systems Engineering, Project Integration, Deployment and Operations, Operational Formation and Leadership, Risk and Strategy Management, Data Analysis, and Network Analysis and Exploitation.

GENERAL DUTIES:

  • Draft network Concept of Operations for approval, perform network risk analyses, technical and analytic support, attending periodic strategic review programs,
  • Facilitate the management of the technical areas
  • Attending, inspecting, and witnessing Client testbed facility exercises
  • Suggesting  functional modifications to Client testbeds to more accurately simulate realistic scenarios
  • Develop technical requirements for long-term strategic programs
  • Review, critique, and summarize experimental test plans and technical development reports
  • Provide scientific guidance on technical approaches
  • Document technical assumptions based upon current information and best-practices,
  • Review vendor proposals and provide selection guidance for Client
  • Participate in review boards to provide Client management with actionable information,
  • Communicate technical updates to all Client shareholders
  • Review internal reporting documents to stay current on changing information
  • Serve on multidisciplinary technical panels for brainstorming activities, Attend pertinent working group sessions to stay informed on current policy guidance
  • Convey highly technical information in a simplified format to best inform management and policy makers
  • Participate in readiness exercises to train Client staff in processes and procedure
  • Identify work environment-specific quality control/quality assurance procedures
  • Familiarize Client to unfamiliar or novel research topics.
  • Key areas of focus include:
  • Reverse Engineering
  • Vulnerability Research
  • Wireless and Network Communications
  • Constraint Solving
  • Exploitation techniques
  • Candidates must be able to think offensively, both defeating and developing new and advanced hardware, firmware, and software exploitation techniques. Projects will be undertaken in small teams with close coordination with customers to quickly enhance capabilities or resolve issues in existing tools.
  • Information capture continues to be a growth industry and we are constantly looking to find the right candidates who can do this challenging work.

REQUIRED QUALIFICATIONS:

  • Proficient in one or more assembly languages (x86, ARM, etc)
  • Expertise in one or more scripting languages (e.g., Python or Ruby)
  • Software development experience in C/C++
  • Detailed understanding of and experience in Vulnerability Research (VR) / Reverse Engineering (RE)
  • Proficiency with disassemblers / debuggers (e.g., IDA Pro, GDB, Windbg)

DESIRED QUALIFICATIONS:

  • Familiarity with PE/ELF file formats, linkers, and compilers
  • Experience solving Capture-the-Flag (CTF) challenges
  • Experience developing and/or reversing Software Protection / Obfuscation techniques
  • Embedded development/reverse engineering experience
  • Strong understanding of and experience with cryptographic protocols

CLEARANCE:

  • Full Scope Polygraph minimum