Malicious Network Activities Expert

SilverEdgeColumbia, MD
21d

About The Position

SilverEdge Government Solutions is seeking an experienced and detail-oriented Malicious Network Activities Expert to support the evaluation of test subjects in the domain of network security. This role involves developing challenging and realistic test materials that assess a test subject's ability to understand and reason about malicious network behavior. The ideal candidate will have hands-on experience analyzing network traffic, identifying attack signatures, and crafting scenarios that mirror real-world threat patterns. You will be responsible for generating packet captures, designing unencrypted traffic scenarios, and creating question-answer pairs that evaluate the test subject’s ability to detect anomalies, recognize protocol misuse, and infer exploit behavior from network evidence. This position requires a strong foundation in network protocols, threat detection, and offensive security tooling.

Requirements

  • TS/SCI with Polygraph level clearance
  • Bachelors degree in Network Security or a related field
  • Strong background in network security and traffic analysis
  • Experience with common attack patterns and their network signatures
  • Understanding of network protocols and their normal vs. abnormal behaviors
  • Familiarity with packet analysis tools (e.g., Wireshark)
  • Proficiency with exploitation frameworks (e.g., Metasploit, etc.) to generate realistic attack traffic
  • Ability to capture and document network traffic containing specific vulnerabilities
  • Knowledge of cybersecurity threat detection methodologies
  • Ability to create realistic but challenging scenarios that test semantic understanding and inferential reasoning
  • Experience in reverse engineering attacks from network traffic evidence

Responsibilities

  • Developing challenging and realistic test materials that assess a test subject's ability to understand and reason about malicious network behavior.
  • Analyzing network traffic.
  • Identifying attack signatures.
  • Crafting scenarios that mirror real-world threat patterns.
  • Generating packet captures.
  • Designing unencrypted traffic scenarios.
  • Creating question-answer pairs that evaluate the test subject’s ability to detect anomalies, recognize protocol misuse, and infer exploit behavior from network evidence.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service