Computer Exploitation Engineer

E&M Technologies, Inc.
9dOnsite

About The Position

E&M Technologies, Inc. is dedicated to recruiting and developing diverse, high-performing talent who are passionate about what they do. Our employees are unified in a shared dedication to our customers’ mission and quest for professional growth. E&M provides an inclusive, engaging environment designed to empower employees and promote work-life success. Fundamental to our culture is an unwavering focus on values, dedication to our communities, and commitment to excellence in everything we do. E&M Technologies, Inc. is currently seeking a Computer Exploitation Engineer to join our team in Fort Belvoir, VA in support of the 1st Information Operations Command. 1st Information Operations Command provides relevant information support to the U.S. Army and all Military Forces around the world to synchronize information capabilities and prepare forces to resist adversary information warfare while providing specialized IO training to enable Army and Joint forces to achieve information advantage.

Requirements

  • Eight (8) years of experience
  • Bachelor's Degree in a related field
  • Computing Environment (Windows and LINUX Certification Level II)
  • Offensive Security Profession Certification OR Global Privacy Enforcement Network (GPEN)
  • Python Certification
  • Cisco Certified Network Associate (CCNA) / Routing and Switching
  • Red Team Apprentice or Offensive Methodology Analysis OR Red Team Operations Course?
  • Must be a U.S. Citizen.
  • Must have or be capable of obtaining a U.S. Department of Defense (DoD) security clearance at the required level.

Nice To Haves

  • AIOPC (Army Information Operations Planners Course) Graduate
  • Experience participating in and effectively contributing to a highly-collaborative team environment.
  • Demonstrated ability to be innovative and to work independently.
  • Strong verbal and written communication skills.

Responsibilities

  • Assess computer network defense and information assurance in support of customer organizations.
  • Provide certified and experienced vulnerability assessment analysts to conduct off-site system vulnerability, network architecture, policy and procedure, application, and system integrity reviews.
  • Assist with development and maintenance of red team detachment assessment methods, tools, and techniques.
  • Perform code review in order to find vulnerabilities.
  • Perform protocol and input fuzzing in order to find vulnerabilities.
  • Perform analysis of disassembled code when source code is unavailable.
  • Develop exploits based on identified vulnerabilities.
  • Recommend fixes and mitigation for identified vulnerabilities.
  • Create/maintain adversary emulation toolsets/development.
  • Contribute to technical and executive summaries of Red Team missions.
  • Document tools, techniques, processes, and procedures.

Benefits

  • Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, parental leave, paid time off, and holidays.
  • Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service