Corvus
Computer Exploitation Engineer
Corvus, Fort Belvoir, Virginia, United States, 22060
JOB SUMMARY
Computer Exploitation Engineer will provide Cyber exploitation of large-scale networks and the data riding on them to uncover unknown and emerging adversary capabilities leveraging expertise in exploitation.
RESPONSIBILITIESAssess computer network defense and information assurance in support of customer organizations.Provide certified and experienced vulnerability assessment analysts to conduct off-site system vulnerability, network architecture, policy and procedure, application, and system integrity reviews.Assist with development and maintenance of red team detachment assessment methods, tools, and techniques.Perform code review in order to find vulnerabilities.Perform protocol and input fuzzing in order to find vulnerabilities.Perform analysis of disassembled code when source code is unavailable.Develop exploits based on identified vulnerabilities.Recommend fixes and mitigation for identified vulnerabilities.Create/maintain adversary emulation toolsets/development.Contribute to technical and executive summaries of Red Team missions.Document tools, techniques, processes, and procedures.KNOWLEDGE/SKILLS/ABILITIES
Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category.Demonstrates the ability to communicate understanding from information that may be incomplete, indirect, highly complex, seemingly unrelated, and / or technically advanced.Demonstrates ability to structure analysis based on trends in reporting and a range of analytic perspectives from other analysts, organizations, and intelligence disciplines.Demonstrates ability to work independently with minimal oversight and direction.Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution.Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.Demonstrates ability to lead teams in researching multifaceted or critical problems. Provides guidance in selecting, designing, and applying analytic methodologies. Uses argument evaluation and validated analytic methodologies to challenge differing perspectives.QUALIFICATIONS:
Minimum Qualifications include:
TS/SCI Security ClearanceIAT Level III Army 8570 Certification (Ex. CASP+CE, CCNP Security, CISA, CISSP (or Associate) GCED, GCIH, or CCSP)Windows Computing Environment (CE) CertificationLinux CE CertificationOffensive Security Certified Professional (OSCP) or GIAC Penetration Tester (GPEN),Red Team Apprentice or Offensive Methodology Analysis or Red Team Operations CoursePreferred Qualifications:
Highschool Diploma and 7+ years or a Bachelors Degree and 3+ years
Corvus Consulting, LLC. provides equal employment opportunity (EEO) to all employees and applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability status, genetic information, marital status, ancestry, protected veteran status, or any other characteristic protected by applicable federal, state, and local laws and offers equal opportunity for VEVRAA Protected Veterans. Corvus Consulting, LLC, will not discriminate against employees and job applicants who inquire about, discuss or disclose compensation information.
Reasonable accommodations that do not cause an undue hardship on the company may be made to enable individuals with disabilities to perform essential functions, as long as that would not hinder or prevent performance of duties or be of a safety concern.
PHYSICAL DEMANDS:
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of the job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is required to reach with hands and arms. The employee is frequently required to sit, stand and walk. The employee may be required to move ten pounds and could occasionally lift or move up to twenty-five pounds.
Disclaimer: The listed duties are not intended to serve as a comprehensive list of all duties performed by all employees in this classification, only a representative summary of primary duties and responsibilities.
Computer Exploitation Engineer will provide Cyber exploitation of large-scale networks and the data riding on them to uncover unknown and emerging adversary capabilities leveraging expertise in exploitation.
RESPONSIBILITIESAssess computer network defense and information assurance in support of customer organizations.Provide certified and experienced vulnerability assessment analysts to conduct off-site system vulnerability, network architecture, policy and procedure, application, and system integrity reviews.Assist with development and maintenance of red team detachment assessment methods, tools, and techniques.Perform code review in order to find vulnerabilities.Perform protocol and input fuzzing in order to find vulnerabilities.Perform analysis of disassembled code when source code is unavailable.Develop exploits based on identified vulnerabilities.Recommend fixes and mitigation for identified vulnerabilities.Create/maintain adversary emulation toolsets/development.Contribute to technical and executive summaries of Red Team missions.Document tools, techniques, processes, and procedures.KNOWLEDGE/SKILLS/ABILITIES
Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category.Demonstrates the ability to communicate understanding from information that may be incomplete, indirect, highly complex, seemingly unrelated, and / or technically advanced.Demonstrates ability to structure analysis based on trends in reporting and a range of analytic perspectives from other analysts, organizations, and intelligence disciplines.Demonstrates ability to work independently with minimal oversight and direction.Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution.Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.Demonstrates ability to lead teams in researching multifaceted or critical problems. Provides guidance in selecting, designing, and applying analytic methodologies. Uses argument evaluation and validated analytic methodologies to challenge differing perspectives.QUALIFICATIONS:
Minimum Qualifications include:
TS/SCI Security ClearanceIAT Level III Army 8570 Certification (Ex. CASP+CE, CCNP Security, CISA, CISSP (or Associate) GCED, GCIH, or CCSP)Windows Computing Environment (CE) CertificationLinux CE CertificationOffensive Security Certified Professional (OSCP) or GIAC Penetration Tester (GPEN),Red Team Apprentice or Offensive Methodology Analysis or Red Team Operations CoursePreferred Qualifications:
Highschool Diploma and 7+ years or a Bachelors Degree and 3+ years
Corvus Consulting, LLC. provides equal employment opportunity (EEO) to all employees and applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability status, genetic information, marital status, ancestry, protected veteran status, or any other characteristic protected by applicable federal, state, and local laws and offers equal opportunity for VEVRAA Protected Veterans. Corvus Consulting, LLC, will not discriminate against employees and job applicants who inquire about, discuss or disclose compensation information.
Reasonable accommodations that do not cause an undue hardship on the company may be made to enable individuals with disabilities to perform essential functions, as long as that would not hinder or prevent performance of duties or be of a safety concern.
PHYSICAL DEMANDS:
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of the job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is required to reach with hands and arms. The employee is frequently required to sit, stand and walk. The employee may be required to move ten pounds and could occasionally lift or move up to twenty-five pounds.
Disclaimer: The listed duties are not intended to serve as a comprehensive list of all duties performed by all employees in this classification, only a representative summary of primary duties and responsibilities.