Conduct research and analysis to identify vulnerabilities and potential threat vectors into systems and networks, develop computer network operations (CNO) and computer network exploitation (CNE) exploits, and engineer attack methodologies.
Requirements
- 8+ years of experience with performing Reverse Engineering, Vulnerability Assessments, Exploitation Development, or Product Evaluations
- Experience with Android, Windows, Linux, and Mac
- Experience with scripting in Perl, Java, Python, Bash, and PowerShell
- Knowledge of project management methodologies, including Agile or Scrum
- Top Secret clearance
- Bachelor’s degree
Benefits
- health, life, disability, financial, and retirement benefits
- paid leave
- professional development
- tuition assistance
- work-life programs
- dependent care
- recognition awards program