RiVidium Configuration Management Job Application

Applying for a Position

 

POSITION TITLE:

Cyber Operator - Advanced

Return to the jobs search page

Requisition #: CO-OPS-001-1 (NCR)

Job Title: Cyber Operator - Advanced

Job Description:

LOCATION:  National Capital Region - Washington, DC or Northern Virginia

EXPERIENCE LEVEL: Advanced

CLEARANCE: TOP SECRET/SCI

WORK ROLE DESCRIPTION:

Conducts collection, processing, and/or geolocation of systems to exploit, locate, and/or track targets of interest. Performs network navigation, tactical forensic analysis, and, when directed, executing on-net operations.

TASKS:

  • Analyze internal operational architecture, tools, and procedures for ways to improve performance.
  • Analyze target operational architecture for ways to gain access.
  • Collaborate with development organizations to create and deploy the tools needed to achieve objectives.
  • Conduct access enabling of wireless computer and digital networks.
  • Conduct collection and processing of wireless computer and digital networks.
  • Conduct exploitation of wireless computer and digital networks.
  • Conduct network scouting and vulnerability analyses of systems within a network.
  • Conduct on-net activities to control and exfiltrate data from deployed technologies.
  • Conduct on-net and off-net activities to control, and exfiltrate data from deployed, automated technologies.
  • Conduct open source data collection via various online tools.
  • Conduct survey of computer and digital networks.
  • Deploy tools to a target and utilize them once deployed (e.g., backdoors, sniffers).
  • Detect exploits against targeted networks and hosts and react accordingly.
  • Develop new techniques for gaining and keeping access to target systems.
  • Edit or execute simple scripts (e.g., Perl, VBScript) on Windows and UNIX systems.
  • Exploit network devices, security devices, and/or terminals or environments using various methods or tools.
  • Facilitate access enabling by physical and/or wireless means.
  • Identify potential points of strength and vulnerability within a network.
  • Maintain situational awareness and functionality of organic operational infrastructure.
  • Operate and maintain automated systems for gaining and maintaining access to target systems.
  • Conduct cyber activities to degrade/remove information resident in computers and computer networks.

ABILITIES:

  • Skill in analyzing memory dumps to extract information.
  • Skill in analyzing target communications internals and externals collected from wireless LANs.
  • Skill in analyzing terminal or environment collection data.
  • Skill in assessing current tools to identify needed improvements.
  • Skill in auditing firewalls, perimeters, routers, and intrusion detection systems.
  • Skill in data mining techniques (e.g., searching file systems) and analysis.
  • Skill in determining installed patches on various operating systems and identifying patch signatures.
  • Skill in extracting information from packet captures.
  • Skill in identifying the devices that work at each level of protocol models.
  • Skill in interpreting vulnerability scanner results to identify vulnerabilities.
  • Skill in knowledge management, including technical documentation techniques (e.g., Wiki page).
  • Skill in processing collected data for follow-on analysis.
  • Skill in providing real-time, actionable geolocation information utilizing target infrastructures.

EDUCATION:

Master degree or higher from an accredited college or university

Prefer an accredited Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering degree; or a degree in a Mathematics or Engineering field.

CERTIFICATION REQUIREMENT(S)  (e.g., DoD 8570.01-M):

IAT Level 2 and Two Penetration Testing Certifications w/ At Least One Being an Advanced Certification (e.g., OSCP, OSCE, OSEE, GSE, GXPN, CPT)

 


Please fill out the short application form below. If you have applied for a position with RiVidium in the past, we will know by querying your email address within our database once you submit the form. At that time we will ask you if you would like to use the resume we have on file to apply for the position described above. You will also have the option to submit a new resume if you wish to do so.

Please fill out application

  • select
  • Please enter the chararacters

Back to the Top