The position of Computer Exploitation Team (CET) Engineer within the Army Red Team will be responsible for conducting threat emulation, red teaming, penetration testing, and vulnerability assessments against DoD and other government networks. Be part of an exciting small team dedicated to keeping America safe at home and abroad. The rapidly changing and dynamic challenges our U.S. government customers face every day will inspire your ingenuity and challenge you to achieve more than you thought possible. This position requires a high level of adaptability, ingenuity and creativity. The ideal candidate will be familiar with the policies, responsibilities, and procedures for conducting threat emulation on a client’s physical or wireless infrastructure. They will have experience conducting penetration tests on production environments in a safe and responsible manner. Upon completion of the assessment, a detailed executive level report will be compiled for the customer.
The Computer Exploitation Team member will be a representative of a technical team responsible for the fielding, training, integration, and enhancement of adversarial TTPs to be used against sanctioned networks in order to improve the security posture of the client.
Conduct threat-based red teaming (network portion) and penetration testing against DoD and other networks designated by the customer utilizing full-spectrum assets. This includes working closely with the Cyber Electromagnetic Activities (CEMA) and Close Access Teams (CAT).
Have the ability to develop/modify modular exploitation tools in a variety of programming languages
During assessments, team members will be expected to collaborate in order to discover evidence of malware, network penetrations, and vulnerabilities within a client’s infrastructure.
Develop in depth assessment reports and brief to technicians, and C-level executives or equivalents.
Bachelor's degree (B.S.) from four-year college or university with at least 7 years of experience in Systems Engineering OR Associates degree with at least 8 years of experience in Systems Engineering.
Candidate must provide copy of 8570 compliant certification.
Candidate must possess an IAT III (level 3) certification as well as a CNDSP Auditor certification (i.e. C|EH or CISA, or GSNA).
The Offensive Security Certified Professional (OSCP) Certification is required BEFORE starting on the contract.
Army experience - IOCAP Certified.
Minimum Associate degree
Clearance: This position requires a Top Secret/SCI security clearance, based on current background investigation (SBI). Clearance processing will be completed by the U.S. Government.
Interested in this position?
Please click Submit your resume, on the right.
Recruiting Point of Contact:
Brandon Gassaway: Brandon.Gassaway@jacobs.com
KeyW EEO Statement
Employment decisions at the Company will be based on merit, qualifications, and abilities. The Company does not discriminate in employment opportunities or practices on the basis of. (1) race, (2) religion, (3) creed, (4) color, (5) national origin, (6) ancestry, (7) sex (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), (8) age, (9) medical condition, (10) marital or domestic partner status, (11) sexual orientation, (12) gender, (13) gender identity, (14) gender expression and transgender status, (15) mental disability or physical disability, (16) genetic information, (17) military or veteran status, (18) citizenship, (19) low-income status, or (20) any other status or characteristic protected by federal, state, or local law.
About the Organization
KeyW is a wholly owned indirect subsidiary of Jacobs.
Jacobs leads the global professional services sector delivering solutions for a more connected, sustainable world. With approximately $12 billion in revenue and a talent force of more than 50,000, Jacobs provides a full spectrum of services including scientific, technical, professional and construction- and program-management for business, industrial, commercial, government and infrastructure sectors. For more information, visit www.jacobs.com, and connect with Jacobs on LinkedIn, Twitter, Facebook and Instagram.