Red Team Tools Developer

Location: Fort Belvoir, VA

Clearance: All positions require an active TS/SCI

What You'll Be Doing:

  • Offensive capability development

  • Will develop exploits, shellcode, and bypassing mitigations

  • Conduct dynamic analysis

  • Malware development, analysis and software vulnerability research

  • What You'll Be Doing:

    • Offensive capability development

    • Will develop exploits, shellcode, and bypassing mitigations

    • Conduct dynamic analysis

    • Malware development, analysis and software vulnerability research

    Required Skills:

    • Must have 8 years of experience overall

    • Active TS/SCI Clearance

    • 3+ years as a software developer

    • Proficient in C and C# and BOFs

    • Should have 1+ years’ experience in offensive capability development for Windows environments

    • Should have 1+ years’ experience working in an agile/scrum environment. ·

    • Special requirements: Must pass the Advanced Cyber Red Team senior developer aptitude test

    • Must be able to travel 15%- OCONUS and CONUS locations

    Desired Skills:

    • Experience with C2 frameworks, especially Cobalt Strike

    • Experience with host-based computer forensics, network-based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetration testing, security operations center analysis, defensive cyber operations, or offensive cyber operation

    • Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research, or software exploit development

    • 3-5 years development industry experience

    • Experience in the development of Windows kernel modules

    • Strong familiarity with Windows Active Directory

    • Experience developing exploits, shellcode, and bypassing mitigations such as nonexecutable stack (NX) and ASLR as well as more advanced exploit mitigations

    • Strong familiarity with the Windows API/Win32 modules for tool development

    • Ability to conduct dynamic analysis as needed via debuggers

    • Expertise in AV/EDR evasion techniques.

  • What You'll Be Doing:

    • Offensive capability development

    • Program in C and C# and BOFs

    • Work in a Scrm/Agile Environment

    • Malware development, analysis and software vulnerability research

    Required Skills:

    • Active TS/SCI Clearance

    • Must be proficient in offensive capability development for Windows environments.

    • Proficient in C and C# and BOFs. Should have experience working in an agile/scrum environment.

    • Special requirements: Professional Certification(s) required for this position are as follows: o Must pass the DCART developer aptitude test before joining DCART as a developer.

    • Must be willing to travel 15%- OCONUS and CONUS locations

    Desired Skills:

    • Host-based computer forensics, network-based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetration testing, security operations center analysis, defensive cyber operations, or offensive cyber operations.

    • Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research, or software exploit development. In addition, desired skills/certifications are: o Offensive Security Experienced Pentester (OSEP), Advanced Windows Exploitation (OSEE), Exploit Researcher and Advanced Penetration Tester (GXPN), Reverse Engineering Malware (GREM)