Computer Exploitation Engineer
Fort Belvoir, VA, US
Full Time Mid-level / Intermediate Clearance required USD 52K - 123K *
Castellum Inc.
Castellum Inc. (NYSE-American: CTM) is a technology company focused on leveraging the power of information technology to help solve our Nation's most pressing national security challenges.JOB SUMMARY
Computer Exploitation Engineer will provide Cyber exploitation of large-scale networks and the data riding on them to uncover unknown and emerging adversary capabilities leveraging expertise in exploitation.
RESPONSIBILITIES
- Assess computer network defense and information assurance in support of customer organizations.
- Provide certified and experienced vulnerability assessment analysts to conduct off-site system vulnerability, network architecture, policy and procedure, application, and system integrity reviews.
- Assist with development and maintenance of red team detachment assessment methods, tools, and techniques.
- Perform code review in order to find vulnerabilities.
- Perform protocol and input fuzzing in order to find vulnerabilities.
- Perform analysis of disassembled code when source code is unavailable.
- Develop exploits based on identified vulnerabilities.
- Recommend fixes and mitigation for identified vulnerabilities.
- Create/maintain adversary emulation toolsets/development.
- Contribute to technical and executive summaries of Red Team missions.
- Document tools, techniques, processes, and procedures.
KNOWLEDGE/SKILLS/ABILITIES
- Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category.
- Demonstrates the ability to communicate understanding from information that may be incomplete, indirect, highly complex, seemingly unrelated, and / or technically advanced.
- Demonstrates ability to structure analysis based on trends in reporting and a range of analytic perspectives from other analysts, organizations, and intelligence disciplines.
- Demonstrates ability to work independently with minimal oversight and direction.
- Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution.
- Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.
- Demonstrates ability to lead teams in researching multifaceted or critical problems. Provides guidance in selecting, designing, and applying analytic methodologies. Uses argument evaluation and validated analytic methodologies to challenge differing perspectives.
QUALIFICATIONS:
Minimum Qualifications include:
- TS/SCI Security Clearance
- IAT Level III Army 8570 Certification (Ex. CASP+CE, CCNP Security, CISA, CISSP (or Associate) GCED, GCIH, or CCSP)
- Windows Computing Environment (CE) Certification
- Linux CE Certification
- Offensive Security Certified Professional (OSCP) or GIAC Penetration Tester (GPEN),
- Red Team Apprentice or Offensive Methodology Analysis or Red Team Operations Course
Preferred Qualifications:
- Highschool Diploma and 7+ years or a Bachelors Degree and 3+ years
Corvus Consulting, LLC. provides equal employment opportunity (EEO) to all employees and applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability status, genetic information, marital status, ancestry, protected veteran status, or any other characteristic protected by applicable federal, state, and local laws and offers equal opportunity for VEVRAA Protected Veterans. Corvus Consulting, LLC, will not discriminate against employees and job applicants who inquire about, discuss or disclose compensation information.
Reasonable accommodations that do not cause an undue hardship on the company may be made to enable individuals with disabilities to perform essential functions, as long as that would not hinder or prevent performance of duties or be of a safety concern.
PHYSICAL DEMANDS:
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of the job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is required to reach with hands and arms. The employee is frequently required to sit, stand and walk. The employee may be required to move ten pounds and could occasionally lift or move up to twenty-five pounds.
Disclaimer: The listed duties are not intended to serve as a comprehensive list of all duties performed by all employees in this classification, only a representative summary of primary duties and responsibilities.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: CASP+ CCNP CCSP CISA CISSP Clearance DoDD 8570 Exploits GCED GCIH GIAC GPEN Linux Offensive security OSCP Red team Security Clearance TS/SCI Vulnerabilities Windows
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.