Experience within the IC or DoD applying cyber expertise, to include computer network operations, network management tools, cyber operations tools, and cyber tool development.
Experience providing technical capabilities or tools to support IC or DoD missions in cyberspace.
Fundamental knowledge of network security concepts, virtual networking, network infrastructure devices, wireless communication technologies, computer network exploitation attack and exploitation concepts, tradecraft, and tools.
Knows the difference between CVE and CWE
Fundamental knowledge of Agile development processes, systems engineering, and IC and DoD accreditation and authorization processes.
Possesses a thorough understanding of software security and security technologies and concepts.
Ability to work in a dynamic and challenging team environment.
Exploit development: Immunity debugger, Olly, IDA Pro, Binary Ninja, Angr, and GDB/EDB
Packet capture and analysis (tcpdump, Wireshark)
Port scanning(nmap, Netcat)
Vulnerability Scanning (Nessus)
Experience with Fuzzing(AFL)
Experience with Metasploit
These Qualifications Would be Nice to Have:
Experience performing computer network exploitation development: embedded reverse engineering, vulnerability research, and application development for software and embedded systems with a focus on Offensive Cyber Operations (OCO) and Defensive Cyber Operations (DCO) activities
Experience with creating metasploit modules
Have a background in Program Analysis and has experience using fuzzers such as AFL.
Desired Certifications: (If applicable)
GIAC Certified Penetration Tester (GPEN)
Certified Information System Security Professional (CISSP)