Digital Network Exploitation Analyst

CACI InternationalChantilly, VA
8dOnsite

About The Position

Want to stretch your skills and knowledge in the Offensive Cyber domain? You will get to work with an agile, fast paced team focused on getting things done, attacking the nation's highest priority intelligence challenges by applying your creativity and cyber domain technical and operational mastery. In this role, you will perform malware analysis and reverse engineering in support of incident response, investigative analysis, and research on existing and emerging cyber threats. You will support incidents and investigations that will require you to “think like an adversary” as both an external actor and an insider risk. If chosen, you will have the opportunity to work on highly visible projects that directly make an impact to the Nations mission. You will be a motivated, passionate leader with the ability to drive our long-term strategic goals with daily tactical objectives. You will be a critical component in taking complex problems and delivering solutions that are simple yet elegant. Be part of a department with an expanding range of programs focusing on Cyber Operations, where you get to grow on and between programs with peers who are dedicated to advancing national security. Participate in fun team outings and team building events where you get to engage with your co-workers and expand your career network. We are a fun, engaging environment with a management team focused on growing your career and making you a part of our future. We offer bonus compensation plans that demonstrate you being appreciated for working on the program and being a part of our team. You'll get paid for cyber events and training, such as our Capture the Flag Events, Internal Research and Development opportunities as well as prepaid courses to nationally recognized certification courses to grow your career. More About the Role: You will work onsite with the client doing high-end and cutting edge cyber related work with small dynamic technical teams You will use open source tools such Metasploit, BurpSuite, nmap and Wireshark as well as proprietary tools to perform red teaming and penetration testing of the client's global network You will reverse engineer network layouts using data collected from the network itself to identify misconfigurations and to map out where various devices interconnect, communicate and what devices look like they may contribute toward the client's technical objective You will develop technical requirements for new tools or enhancements to existing tools and become the tools "champion" throughout the tool's life cycle You will document all work performed on the client's behalf daily where you will comment on what tools were used and devices that were identified and accessed You will pro-actively identify, define, and advocate technical processes, approaches, and concepts to enhance/improve exploitation efforts You will write and produce high-quality technical reports related to the scope, nature, and characteristics of the client's technical objective that is suitable for dissemination to both technical and nontechnical audiences You will analyze software, firmware and hardware using a variety of reverse engineering techniques to understand possible security vulnerabilities and potential misconfigurations, working closely with teammates who value innovation and execution You will performing in-depth analysis (dynamic/static) on malicious software based platforms to provide actionable intelligence; as appropriate, provide remediation recommendations You will analyze, disassemble, and reverse-engineer malicious code; documenting and transitioning results in reports, presentations, and technical exchanges

Requirements

  • Active TS/SCI with required Polygraph clearance
  • 7+ years of related experience
  • Worked with Ansible, Puppet or Chef for automation of deployment of server software packages
  • Experience with programing languages such as Python, Shell, Assembly, C/C++
  • Familiar with embedded Internet of Things systems, the protocols they use for discovery and communications and the dangers they can present
  • Understand the concepts behind software defined radios (SDR) and how to capture and alter capture RF communications
  • Ability to combine components into a functioning multi-layer network of heterogeneous devices and applications
  • Working knowledge of Microsoft Windows Operating System and/or UNIX
  • Working knowledge database Administration and application development with Oracle, PostresSQL, SQL Server, and/or MySQL

Nice To Haves

  • Advanced GIAC and/or (ISC)2 network/cyber security specialties
  • Familiar with 802.11, Bluetooth and LTE protocols and technologies
  • Experience with wired telephony technology (hardware or core software)
  • Familiar with mobile telephony technology (hardware or core software)
  • Experience with ubiquitous core network device (switch/router/hub) technology (hardware or core software)

Responsibilities

  • perform malware analysis and reverse engineering in support of incident response, investigative analysis, and research on existing and emerging cyber threats
  • support incidents and investigations that will require you to “think like an adversary” as both an external actor and an insider risk
  • work on highly visible projects that directly make an impact to the Nations mission
  • drive our long-term strategic goals with daily tactical objectives
  • taking complex problems and delivering solutions that are simple yet elegant
  • reverse engineer network layouts using data collected from the network itself to identify misconfigurations and to map out where various devices interconnect, communicate and what devices look like they may contribute toward the client's technical objective
  • develop technical requirements for new tools or enhancements to existing tools and become the tools "champion" throughout the tool's life cycle
  • document all work performed on the client's behalf daily where you will comment on what tools were used and devices that were identified and accessed
  • pro-actively identify, define, and advocate technical processes, approaches, and concepts to enhance/improve exploitation efforts
  • write and produce high-quality technical reports related to the scope, nature, and characteristics of the client's technical objective that is suitable for dissemination to both technical and nontechnical audiences
  • analyze software, firmware and hardware using a variety of reverse engineering techniques to understand possible security vulnerabilities and potential misconfigurations, working closely with teammates who value innovation and execution
  • performing in-depth analysis (dynamic/static) on malicious software based platforms to provide actionable intelligence; as appropriate, provide remediation recommendations
  • analyze, disassemble, and reverse-engineer malicious code; documenting and transitioning results in reports, presentations, and technical exchanges

Benefits

  • We’ve been named a Best Place to Work by the Washington Post.
  • Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
  • We offer competitive benefits and learning and development opportunities.
  • We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
  • For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
  • At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Education Level

No Education Listed

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service