Our Ability Jobs

Job Information

Frontier Technology Inc. Sr. Advisory Exploitation Analyst in Suffolk, Virginia

Overview

At FTI, we are united by one common mission; supporting those that protect our nation so they can make the best-informed decisions during critical moments when seconds count. We want you to bring your passion and expertise to contribute to that essential mission. We strive to incorporate our values to create a culture of collaboration and trust, where you can share your ideas and innovate. If you are inspired by making a positive impact through developing data driven solutions, FTI would appreciate the opportunity to learn more about you.

We’re seeking a Sr. Advisory Exploitation Analyst to join the Navy Cyber Defense Operations Command (NCDOC). In this role, you'll develop tailored defenses through detailed adversary analysis. Your responsibilities will include adversary emulation, forensic and malware analysis, reverse engineering, and creating both custom malware signatures and tools. This is a unique chance to be part of a new team of Subject Matter Experts, where you’ll use your offensive cyber skills to innovate and enhance the Navy's cyber defenses with cutting-edge techniques.

Responsibilities

  • Create test plans for cybersecurity penetration testing during developmental testing (DT) and operational testing (OT).

  • Familiarity with Risk Management Framework, Cybersecurity requirements during the acquisition lifecycle (i.e. Developmental and Operational Testing).

  • Experience working with Operational Testing Agencies (i.e. COMOPTEVFOR, ATEC, AFOTEC, MCOTEA, JITC).

  • Execute DT and OT plans to discover in depth vulnerabilities and usable exploitations in a system and/or organization.

  • Produce written reports and briefs on the results of penetration tests.

  • Use commercial and open source network cyber assessment tools (e.g. Core Impact, Nmap, Metasploit, and Nessus).

  • Exploit common vulnerabilities and misconfigurations associated with common operating systems (Windows, Linux, etc.), protocols (HTTP, FTP, etc.), and network security services (PKI, HTTPS, etc.).

  • Assist with procuring, managing, and training for operational infrastructure and tactics associated with Red Team types of “attack platforms.”

  • Conduct planning and execute Red Teaming, Penetration Testing, and/or Capture the Flag events.

  • Research various cyber actors’ TTPs, organizational structures, capabilities, personas, and environments, and integrate findings into Cyber Red Teaming or penetration test operations.

  • Develop and utilize testing methodology for threat emulation and vulnerability validation.

  • Develop Operational Risk Management (ORM) concepts and matrixes to support operations and exercises.

  • Support execution of and help in development of TTPs for physical penetration testing or Red Teaming.

  • Develop products and materials required to support TTP development working groups, planning groups, operational planning teams, conferences, table top exercises, war games and operational experiments.

Education/Qualifications

Required:

  • High School diploma.

  • Active U.S. Dept.of DefenseSecretclearance with TS/SCI eligibility.

  • 7+ years of experience developing, reviewing, and implementing mission area-related policy, doctrine, and development of Navy concepts, doctrine, tactics, techniques, and procedures.

  • 7+ years identifying mission area-related concepts and technologies for new innovative application within the Navy’s experimentation process.

  • 7+ years developing and supporting development of Navy mission areas-related operational concepts, tactics, and experimental concepts and technologies.

  • 7+ years planning and executing Joint/Navy experimentation with mission area-related concepts and capabilities.

  • 7+ years of demonstrated prior experience in the execution of mission area-related capabilities at the tactical level.

  • Familiarity with Risk Management Framework, Cybersecurity requirements during the acquisition lifecycle (i.e. Developmental and Operational Testing).

  • Experience working with Operational Testing Agencies (i.e. COMOPTEVFOR, ATEC, AFOTEC, MCOTEA, JITC).

  • Have a working level ability at least one of the following programing languages: Python, C++, Javascript, or Ruby.

  • Possess at least one of the following technical certifications:

  • Offensive Security Certified Professional (OSCP)

  • Web Application Penetration Tester (WAPT)

  • GIAC Web Application Penetration Tester (GWAPT)

  • GIAC Penetration Tester (GPEN)

  • Cisco Certified Network Associate (CCNA)

    Preferred:

  • Active U.S. Dept.of Defense TS/SCI clearance.

  • Bachelor's degree in Cybersecurity, Computer Science, or another related field.

    #LI-KC1

    #LI-Onsite

ID2024-6323

CategoryIT

TypeRegular Full-Time

Location : LocationUS-VA-Suffolk

TelecommuteNo

Clearance RequirementsSecret

DirectEmployers