Red Team Tools Developer
Location: Fort Belvoir, VA
Clearance: All positions require an active TS/SCI
What You'll Be Doing:
Offensive capability development
Will develop exploits, shellcode, and bypassing mitigations
Conduct dynamic analysis
Malware development, analysis and software vulnerability research
-
What You'll Be Doing:
Offensive capability development
Will develop exploits, shellcode, and bypassing mitigations
Conduct dynamic analysis
Malware development, analysis and software vulnerability research
Required Skills:
Must have 8 years of experience overall
Active TS/SCI Clearance
3+ years as a software developer
Proficient in C and C# and BOFs
Should have 1+ years’ experience in offensive capability development for Windows environments
Should have 1+ years’ experience working in an agile/scrum environment. ·
Special requirements: Must pass the Advanced Cyber Red Team senior developer aptitude test
Must be able to travel 15%- OCONUS and CONUS locations
Desired Skills:
Experience with C2 frameworks, especially Cobalt Strike
Experience with host-based computer forensics, network-based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetration testing, security operations center analysis, defensive cyber operations, or offensive cyber operation
Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research, or software exploit development
3-5 years development industry experience
Experience in the development of Windows kernel modules
Strong familiarity with Windows Active Directory
Experience developing exploits, shellcode, and bypassing mitigations such as nonexecutable stack (NX) and ASLR as well as more advanced exploit mitigations
Strong familiarity with the Windows API/Win32 modules for tool development
Ability to conduct dynamic analysis as needed via debuggers
Expertise in AV/EDR evasion techniques.
-
What You'll Be Doing:
Offensive capability development
Program in C and C# and BOFs
Work in a Scrm/Agile Environment
Malware development, analysis and software vulnerability research
Required Skills:
Active TS/SCI Clearance
Must be proficient in offensive capability development for Windows environments.
Proficient in C and C# and BOFs. Should have experience working in an agile/scrum environment.
Special requirements: Professional Certification(s) required for this position are as follows: o Must pass the DCART developer aptitude test before joining DCART as a developer.
Must be willing to travel 15%- OCONUS and CONUS locations
Desired Skills:
Host-based computer forensics, network-based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetration testing, security operations center analysis, defensive cyber operations, or offensive cyber operations.
Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research, or software exploit development. In addition, desired skills/certifications are: o Offensive Security Experienced Pentester (OSEP), Advanced Windows Exploitation (OSEE), Exploit Researcher and Advanced Penetration Tester (GXPN), Reverse Engineering Malware (GREM)