Computer Exploitation Engineer at E&M Technologies, Inc.
, Virginia, United States -
Full Time


Start Date

Immediate

Expiry Date

13 Mar, 26

Salary

0.0

Posted On

13 Dec, 25

Experience

10 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Computer Network Defense, Information Assurance, Vulnerability Assessment, Red Team Assessment, Code Review, Protocol Fuzzing, Exploit Development, Technical Summaries, Documentation, Python, Cisco, Offensive Security, Linux, Windows, Collaboration, Communication

Industry

IT Services and IT Consulting

Description
Description POSITION: Computer Exploitation Engineer WORK LOCATION: Fort Belvoir, VA JOB CATEGORY: Intelligence JOB TYPE: Full-Time REQUISITION ID: EM01-045 CITIZENSHIP: United States Citizen CLEARANCE TYPE: Top Secret/SCI TRAVEL REQUIREMENTS: None E&M Technologies, Inc. is dedicated to recruiting and developing diverse, high-performing talent who are passionate about what they do. Our employees are unified in a shared dedication to our customers’ mission and quest for professional growth. E&M provides an inclusive, engaging environment designed to empower employees and promote work-life success. Fundamental to our culture is an unwavering focus on values, dedication to our communities, and commitment to excellence in everything we do. E&M Technologies, Inc. is currently seeking a Computer Exploitation Engineer to join our team in Fort Belvoir, VA in support of the 1st Information Operations Command. 1st Information Operations Command provides relevant information support to the U.S. Army and all Military Forces around the world to synchronize information capabilities and prepare forces to resist adversary information warfare while providing specialized IO training to enable Army and Joint forces to achieve information advantage. Job Responsibilities: Assess computer network defense and information assurance in support of customer organizations.?? Provide certified and experienced vulnerability assessment analysts to conduct off-site system vulnerability, network architecture, policy and procedure, application, and system integrity reviews.?? Assist with development and maintenance of red team detachment assessment methods, tools, and techniques.?? Perform code review in order to find vulnerabilities.?? Perform protocol and input fuzzing in order to find vulnerabilities.?? Perform analysis of disassembled code when source code is unavailable.?? Develop exploits based on identified vulnerabilities.?? Recommend fixes and mitigation for identified vulnerabilities.?? Create/maintain adversary emulation toolsets/development.?? Contribute to technical and executive summaries of Red Team missions.?? Document tools, techniques, processes, and procedures. Requirements Minimum Qualifications: Eight (8) years of experience Bachelor's Degree in a related field Computing Environment (Windows and LINUX Certification Level II)?? Offensive Security Profession Certification OR Global Privacy Enforcement Network (GPEN)?? Python Certification?? Cisco Certified Network Associate (CCNA) / Routing and Switching?? Red Team Apprentice or Offensive Methodology Analysis OR Red Team Operations Course? Must be a U.S. Citizen. Must have or be capable of obtaining a U.S. Department of Defense (DoD) security clearance at the required level. Preferred Qualifications: AIOPC (Army Information Operations Planners Course) Graduate Experience participating in and effectively contributing to a highly-collaborative team environment. Demonstrated ability to be innovative and to work independently. Strong verbal and written communication skills. To Apply for this Position: You must have the Minimum Qualifications in your resume to be selected as a candidate. The salary range provided is a good faith estimate representative of all experience levels. E&M considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate’s work experience, location, education/training, and key skills. Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement. This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.? E&M anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require E&M to shorten or extend the application window.? E&M is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. E&M provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans’ Readjustment Assistance Act.
Responsibilities
The Computer Exploitation Engineer will assess computer network defense and information assurance, conduct vulnerability assessments, and develop exploits based on identified vulnerabilities. They will also document tools, techniques, processes, and contribute to technical summaries of Red Team missions.
Loading...