Reverse Engineer/Vulnerability Analyst

Full Visibility
6dOnsite

About The Position

Full Visibility is seeking a Reverse Engineer/Vulnerability Analyst to work in Quantico, VA. Candidate must possess an active Top Secret clearance. The Reverse Engineer/Vulnerability Analyst will conduct testing and analysis to identify vulnerabilities and potential threat vectors into systems and networks, develop exploits, and engineers attack methodologies. Applies specific functional knowledge; working/general industry knowledge. Develops or contributes to solutions to a variety of problems of moderate scope and complexity. Works independently with some guidance; may review or guide activities of more junior employees. Develop CNO and CNE exploits, enable capabilities, and engineer attack methodologies. Apply leading-edge principles, theories, and technologies and contribute to the development of new cyber operations concepts.

Requirements

  • 3+ years of experience with performing reverse engineering, vulnerability assessments, exploitation development, or product evaluations
  • Experience with Windows, Linux, or Mac
  • Experience with scripting in Perl, Java, Python, Bash, or PowerShell
  • Knowledge of project management methodologies, including Agile or Scrum
  • Top Secret clearance with SCI eligibility
  • Bachelor’s degree in a Computer Science, Information Technology, Information Systems, or Computer Engineering field

Nice To Haves

  • Experience with federal law enforcement or Intelligence Community cyber or IT
  • Experience with cyber operations, CNO, and CNE
  • Knowledge of Android and IOS application development environments
  • OSCP and OSWP Certifications

Responsibilities

  • Conduct testing and analysis to identify vulnerabilities and potential threat vectors into systems and networks
  • Develop exploits
  • Engineers attack methodologies
  • Develop or contributes to solutions to a variety of problems of moderate scope and complexity
  • Develop CNO and CNE exploits
  • Enable capabilities
  • Engineer attack methodologies
  • Contribute to the development of new cyber operations concepts
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service