Exploit Developer with Security Clearance - Suffolk, VA, United States - AERMOR

    Default job background
    Technology / Internet
    Description

    Employee Type:
    Full Time


    Full-Time Location:
    Suffolk, VA


    Job Type:
    Exploit Development

    Experience: 4+ Years

    Clearance:
    Secret AERMOR is hiring a qualified developer to provide project management, detailed subject matter expertise, and expert guidance to government personnel in the execution of Cyber Red Team operations
    As well as managing the engineering and deployment of exploitation capabilities
    This position includes adapting to existing industry exploits to work within the Navy's architectures and developing new exploits and payloads based on emerging cyber threats

    Responsibilities Include:

    • Application of industry standards for secure software development and lifecycle management.
    • Design, development, testing, modification, and operational application of attack and exploitation tools
    (to include familiarity with industry-standard software engineering concepts and languages such as C+, Python, PHP, Assembly, etc.)

    • Reverse-engineering and debugging of Windows and X-nix based applications and malware utilizing industry-standard tools such as IDA Pro, WinDbg, and OllyDbg.
    • Windows and X-nix based operating systems.
    • Windows and X-nix based heap and stack management exploitation and implementation of heap and stack exploitation mitigation (such as ASLR bypass, heap spraying).
    • Return-oriented programming (ROP) exploitation techniques to execute code in the presence of security defenses (non-executable memory and code signing).
    • Exploitation and vulnerabilities associated with most common operating systems (Windows, Linux, etc.), protocols (HTTP, FTP, etc.), and network security services (PKI, HTTPS, etc.).
    • Improvising courses of action (COAs) and capability development/modification during operations (i.e
    remote access/exploitation and close access team operations) to achieve desired red teaming effects.

    • Development, modification, and utilization of network enumeration engines, Open Source Research (OSR) engines, and reverse engineering exploitation frameworks.
    • Development of advanced hacking capabilities (e.g
    botnet, client deception, advanced Trojans, data exfiltration, mobile device discovery and exploitation).

    • Provide expertise in and techniques, tactics, and procedures (TTPs) development for emulation of cyber adversaries.
    • Use commercial and open-source network cyber assessment tools (e.g
    Core Impact, Nmap, Metasploit, and Nessus).

    • Exploit common vulnerabilities and misconfigurations associated with common operating systems (Windows, Linux, etc.), protocols (HTTP, FTP, etc.), and network security services (PKI, HTTPS, etc.)
    • Conduct planning and executing Red Teaming, Penetration Testing, and or Capture the Flag events.

    Required Skills and Experience:

    • Must possess an active and current U.S
    Government issues Secret level security clearance.

    • Minimum of 4-years' experience in exploit development, reverse engineering, red team capabilities, and engineering are required to meet successfully support the Navy Red Team's mission requirements.
    • Experience with researching various cyber actors' TTPs, organizational structures, capabilities, personas, and environments, and integrating findings into penetration tests or web risk assessment operations.
    • Web Server configuration knowledge: Microsoft IIS, Apache HTTP Server, Apache Tomcat.
    • Experience with the development and utilization of testing methodology for cloud-based and networked systems.
    • Experience with modification, testing and utilization of computer network attack and exploitation tools.
    • Ability to design, build, and implement software, Cyber assessment tools, information assurance products, or computer security applications, preferred.
    • Experience with a computer network or system design and implementation preferred.
    • Have a working level ability with one of these programming languages; Python, Assembly, C, C++, .Net, Perl, PHP, JavaScript, Ruby.
    • Certified Ethical Hacker (CEH) and Offensive Security Certified Professional (OSCP) certifications or equivalent.
    • Familiarity with Naval Information System Architecture.