Description:
- Perform adversarial threat emulation (Red Teaming) and penetration testing to assess the performance of aeronautical systems, subsystems, equipment (platform IT), and on government networks including Windows domains, Linux systems, switches, routers, and other connected network devices.
- Apply and/or develop highly advanced principles, concepts, and tactics. ?
- Identify issues and vulnerabilities associated with operational networks and programs.
Requirements:
- Bachelor’s degree in related discipline, or equivalent experience/combined education and/or advanced certification.
- Active TS Security Clearance with SCI or SCI eligibility
- At least 10 years of pen testing, red team operations, and/or offensive security experience including experience conducting on-net assessments
- Experience operating open source and commercial tools such as Metasploit, Burp Suite, Cobalt Strike, NMAP, Core Impact, etc.
- Working knowledge of IP network protocols, subnetting, routing, switching, etc.
- Experience in one or more of the following cybersecurity disciplines: Penetration testing of modern Windows and Linux operating systems and IP-based networks; Exploit and malware development targeting modern operating systems and defenses; Reverse engineering; Web application penetration testing; Software development; Hardware hacking; Cryptography; Software defined networks; Digital forensics; Control systems; and/or Radio Frequency (RF)
- Ability to work in a diverse team environment.
- Industry certification of EC-Council Certified Ethical Hacker (C|EH) and ISC2 Certified Information Systems Security Professional (CISSP) or their equivalents are required.
- Be able to obtain one or more of the following vendor certifications within 6 months of being hired: Offensive Security Certified Engineer (OSCE); Offensive Security Certified Professional (OSCP); and GIAC Certified Exploit Researcher and Advanced Penetration Testers (GXPN)
Desired Skills
- Cyber related military training courses such as Title 10 Interactive On-Net Operator Course, Joint Cyber Analysis Course (JCAC), and Cyber Operations Specialist Qualification Course.
- Industry certification of Offensive Security Certified Professional (OSCP) is highly desirable.
- Specialization in web application penetration testing is a plus.
- Experience with WiFi and/or Software Defined Radio (SDR) hacking is a plus.
- Experience with red team / adversarial emulations is a plus.
- Experience executing Close Access Team (CAT) assessments is a plus.
- Experience with weapon systems assessments is a major plus.
- Experience with bash scripting, Python, and/or PowerShell is a major plus.
- Experience working in a cyber range is a major plus.
About Us: We are Command Post Technologies, Inc. (CPT). CPT is a Service-Disabled, Veteran-Owned Small Business (SDVOSB), providing engineering services in the areas of Cyber Security, Software Development, Test & Evaluation, and Strategic Planning. CPT employees appreciate working in a caring environment that promotes a healthy work-life balance. As individuals, we come together as a team, supporting a culture rooted in our core principles of integrity, determination, and innovation. In all CPT’s collaboration efforts, our team prioritizes communication, accountability, and being resourceful to maximize efficiency and results.
Incase you would like to apply to this job directly from the source, please click here