Current jobs related to Computer Exploitation Engineer - Fort Belvoir - Castellum Inc


  • Fort Belvoir, United States Corvus Full time

    JOB SUMMARY Computer Exploitation Engineer will provide Cyber exploitation of large-scale networks and the data riding on them to uncover unknown and emerging adversary capabilities leveraging expertise in exploitation. RESPONSIBILITIES Assess computer network defense and information assurance in support of customer organizations. Provide certified and...

  • Exploitation Analyst

    3 months ago


    Fort Meade, United States Adaptic LLC Full time

    Shift Type Job Title Exploitation Analyst Location Fort Meade, MD - Ft. George G. Meade, MD 20755 US (Primary) Category Exploitation Analyst (EA) Salary Grade Date Needed By Job Type Full-time Travel Job Description Overview Be on the cutting edge of Cyber Operations as an Exploitation Analyst supporting the Intelligence Community! Apply your deep...

  • Exploitation Analyst

    4 weeks ago


    Fort Meade, United States Helm Point Solutions Full time

    Exploitation Analyst (Levels 1-4)Location: Fort Meade, Maryland Company: Helm Point Solutions Clearance Required: Active TS/SCI + Poly Job Type: Full-time About Helm Point Solutions: Helm Point Solutions is a growing, woman-owned Cyber & Physical Security Contractor located in Columbia, Maryland. We are dedicated to creating an inclusive environment where...


  • Fort Belvoir, United States Corvus Full time

    JOB SUMMARY The Cybersecurity Exploitation Specialist will engage in the cyber exploitation of extensive networks and the data traversing them to reveal unknown and evolving adversary capabilities by utilizing expertise in exploitation techniques. RESPONSIBILITIES Evaluate computer network defense and information assurance to support client...

  • Exploitation Analyst

    2 months ago


    Fort Meade, United States Helm Point Solutions Full time

    What type of company is Helm Point? Helm Point Solutions is a growing woman-owned Cyber & Physical Security Contractor located in Columbia, Maryland. We strive to make every employee belong, be heard and be successful in their career. This includes listening to your needs, providing rewarding and challenging opportunities, and offering tools to succeed in...


  • Fort Meade, Florida, United States Peraton Full time

    Position OverviewPeraton's Cyber Mission is at the forefront of providing essential support to the Intelligence community, delivering advanced Next Generation SIGINT Analysts and Cyber professionals dedicated to safeguarding our nation's security. Join a team of skilled SIGINT, Intelligence, and Cyber experts committed to offering innovative cybersecurity...


  • Fort Belvoir, United States Quantum Research International Full time

    Overview: Quantum Research International, Inc. (Quantum) provides our national defense and federal civilian and industry customers with services and products in the following main areas: 1) Cybersecurity and Information Operations; 2) Space Operations and Control; 3) Aviation Systems; 4) Ground, Air and Missile Defense, and Fires Support Systems; 5)...


  • Fort Meade, United States Amentum Full time

    Amentum is seeking Exploitation Analysts 1-4 (EA) to use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur.  Essential Duties: Primary mission is...


  • Fort Belvoir, Virginia, United States Quantum Research International Full time

    Job SummaryWe are seeking a highly skilled Cybersecurity Analyst to join our team at Quantum Research International. As a Cybersecurity Analyst, you will be responsible for executing computer network operations via penetration testing and emulating Advanced Adversaries, Insider Threats, and Purple Team against our systems for the purpose of strengthening...

  • Exploitation Analysts

    1 month ago


    Fort Meade, United States Amentum Full time

    Job Description Amentum is seeking Exploitation Analysts to use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur. Essential Duties: Primary mission is...


  • Fort Meade, United States MIT Lincoln Laboratory Full time

    Located onsite in Fort Meade, MD From the MIT Lincoln Laboratory field office in Annapolis Junction, MD, you will be immersed in the missions of key government sponsors.The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop and prototype...


  • Fort Meade, United States JY Systems LLC Full time

    Job DetailsJob Location Fort Meade, MD Description The Exploitation Analyst will collaborate to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks. The Exploitation Analyst will: Assess data for new or...


  • Fort Meade, United States Applied Insight Full time

    About Us: Innovating to solve real-world problems Applied Insight enhances the ability of federal government customers to preserve national security, deliver justice and serve the public with advanced technologies and quality analysis. We work closely with agencies and industry to overcome technical and cultural hurdles to innovation, empowering them with...


  • Fort Meade, United States Applied Insight Full time

    Job Description About Us: Innovating to solve real-world problems Applied Insight enhances the ability of federal government customers to preserve national security, deliver justice and serve the public with advanced technologies and quality analysis. We work closely with agencies and industry to overcome technical and cultural hurdles to innovation,...


  • Fort Meade, United States Amentum Full time

    Amentum is seeking Exploitation Analysts 1-4 (EA) to use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur. Essential Duties:Primary mission is...


  • Fort Meade, United States Amentum Full time

    Amentum is seeking multiple Digital Network Exploitation Analyst 1-4 (DNEA) to perform technical analysis of metadata and content to ensure target continuity, to evaluate intelligence value of targets, and develop techniques to establish continued collection or gain additional target information.Essential Duties: The DNEA will blend traditional intelligence...

  • Exploitation Analyst

    4 months ago


    Fort Meade, United States Amentum Full time

    Amentum is seeking Exploitation Analysts to use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur. Essential Duties:Primary mission is exploitation. Create...


  • Fort Meade, United States Hoplite Solutions LLC Full time

    Hoplite Solutions is seeking Digital Network Exploitation Analysts (DNEAs) of all skill levels for a variety of roles to support core Intelligence Community (IC) missions for a newly awarded contract in Maryland. As a Digital Network Exploitation Analyst, you will: evaluate target opportunities using all source data to understand and map target networks,...


  • Fort Meade, United States Belay Technologies Full time

    Belay Technologies has been voted Baltimore Business Journal's (BBJ) Best Places to Work 2019, runner up in 2020 and a finalist in 2021! Belay Technologies is seeking a CNO cloud exploiter for up-and-coming projects where you will analyze, design, develop, prototype, modify, and integrate solutions to provide mission-centric results. You will work...


  • Fort Belvoir, United States Kaimetrix, L.L.C. Full time

    Job DescriptionJob DescriptionTIER III ENGINEER SUPPORT - SENIOR SYSTEMS ENGINEERROLEKaimetrix is hiring a highly experienced and skilled Tier III Engineer Support - Senior Systems Engineer to join our team at Fort Eisenhower, GA. This position requires a professional with a strong background in systems engineering, advanced certifications, and extensive...

Computer Exploitation Engineer

4 months ago


Fort Belvoir, United States Castellum Inc Full time
Job DescriptionJob Description

JOB SUMMARY

Computer Exploitation Engineer will provide Cyber exploitation of large-scale networks and the data riding on them to uncover unknown and emerging adversary capabilities leveraging expertise in exploitation.

RESPONSIBILITIES

  • Assess computer network defense and information assurance in support of customer organizations.
  • Provide certified and experienced vulnerability assessment analysts to conduct off-site system vulnerability, network architecture, policy and procedure, application, and system integrity reviews.
  • Assist with development and maintenance of red team detachment assessment methods, tools, and techniques.
  • Perform code review in order to find vulnerabilities.
  • Perform protocol and input fuzzing in order to find vulnerabilities.
  • Perform analysis of disassembled code when source code is unavailable.
  • Develop exploits based on identified vulnerabilities.
  • Recommend fixes and mitigation for identified vulnerabilities.
  • Create/maintain adversary emulation toolsets/development.
  • Contribute to technical and executive summaries of Red Team missions.
  • Document tools, techniques, processes, and procedures.

KNOWLEDGE/SKILLS/ABILITIES

  • Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category.
  • Demonstrates the ability to communicate understanding from information that may be incomplete, indirect, highly complex, seemingly unrelated, and / or technically advanced.
  • Demonstrates ability to structure analysis based on trends in reporting and a range of analytic perspectives from other analysts, organizations, and intelligence disciplines.
  • Demonstrates ability to work independently with minimal oversight and direction.
  • Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution.
  • Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.
  • Demonstrates ability to lead teams in researching multifaceted or critical problems. Provides guidance in selecting, designing, and applying analytic methodologies. Uses argument evaluation and validated analytic methodologies to challenge differing perspectives.

QUALIFICATIONS:

Minimum Qualifications include:

  • TS/SCI Security Clearance
  • IAT Level III Army 8570 Certification (Ex. CASP+CE, CCNP Security, CISA, CISSP (or Associate) GCED, GCIH, or CCSP)
  • Windows Computing Environment (CE) Certification
  • Linux CE Certification
  • Offensive Security Certified Professional (OSCP) or GIAC Penetration Tester (GPEN),
  • Red Team Apprentice or Offensive Methodology Analysis or Red Team Operations Course

Preferred Qualifications:

  • Highschool Diploma and 7+ years or a Bachelors Degree and 3+ years


Corvus Consulting, LLC. provides equal employment opportunity (EEO) to all employees and applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability status, genetic information, marital status, ancestry, protected veteran status, or any other characteristic protected by applicable federal, state, and local laws and offers equal opportunity for VEVRAA Protected Veterans. Corvus Consulting, LLC, will not discriminate against employees and job applicants who inquire about, discuss or disclose compensation information.

Reasonable accommodations that do not cause an undue hardship on the company may be made to enable individuals with disabilities to perform essential functions, as long as that would not hinder or prevent performance of duties or be of a safety concern.

PHYSICAL DEMANDS:

The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of the job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

While performing the duties of this job, the employee is required to reach with hands and arms. The employee is frequently required to sit, stand and walk. The employee may be required to move ten pounds and could occasionally lift or move up to twenty-five pounds.

Disclaimer: The listed duties are not intended to serve as a comprehensive list of all duties performed by all employees in this classification, only a representative summary of primary duties and responsibilities.