You are viewing a preview of this job. Log in or register to view more details about this job.

aliant Integrated Services has an exciting opportunity for a Junior Software Tool Development supporting the Defense Threat Reduction Agency’s (DTRA) Advance Red Cyber program in executing Red Team Assessments. Red Teams perform assessments from an adversarial viewpoint and use the full spectrum of identified adversarial capabilities, limited only by restrictions mandated by the customer and legal, safety, and security constraints, to test and evaluate protection strategies and demonstrate exploitation of identified vulnerabilities. The Software Tool Developer Junior will have the opportunity to create new and innovative tools for Red Cyber team Operators to use in cyber assessment operations of U.S. Government and DoD critical networks.  We will sponsor your clearance - TS/SCI.  

ESSENTIAL DUTIES AND RESPONSIBILITIES:

  • Develop tools, exploits, and code for use on red cyber operations.
  • Conduct open-source research on cyber related vulnerabilities and exploitation development.
  • Expertise as a Reverse engineer analyzing source code to develop tools or exploits.
  • Expertise with Script or develop in one or more language (e.g., C, C++).
  • Performing code review on all offensive scripts/code and shepherding them through all approval processes.
  • Analyze operational Techniques Tactics and Procedures (TTPs) and developing exploits and scripts to automate and improve operational processes. These products will help to better emulate adversarial threats and attacks and demonstrate and exploit vulnerabilities to sensitive mission critical networks and systems.
  • Document safe and secure usage for internally and externally developed tools IAW Red Team policies and procedures.
  • Support and/or conduct Dev Ops review of code for operational approval.
  • Leverage existing proof of concept code to build and tailor exploits for use in Command and Control (C2) tools.
  • Support the development and tuning of C2 tools to enhance effectiveness and reduce detection likelihood.
  • Support urgent development requests as required in support of assessments. Tailored tools and exploits may require assembly, testing, and approval within 24 hours of identifying a vulnerability.
  • Hybrid work schedule - 4 days in office, 1 remote.