CACI International Computer Network Operator in Chantilly, Virginia
What You’ll Get to Do:If chosen, YOU will get to work with an agile, fast paced team focused on defending our client’s global networks through threat hunting and tactical analysis of ongoing attacks. In this role, you will perform malware analysis and reverse engineering in support of incident response, investigative analysis, and research on existing and emerging cyber threats. You will support incidents and investigations that will require you to “think like an adversary” as both an external actor and an insider risk. If chosen, YOU will have the opportunity to work on highly visible projects that directly make an impact to the Nations mission. YOU will be a motivated, passionate leader with the ability to drive our long-term strategic goals with daily tactical objectives. YOU will be a critical component in taking complex problems and delivering solutions that are simple yet elegant.More About the Role:
You will work onsite with the client doing high-end and cutting edge cyber related work with small dynamic technical teams
You will use open source tools such Metasploit, BurpSuite, nmap and Wireshark as well as proprietary tools to perform red teaming and penetration testing of the client's global network
You will reverse engineer network layouts using data collected from the network itself to identify misconfigurations and to map out where various devices interconnect, communicate and what devices look like they may contribute toward the client's technical objective
You will develop technical requirements for new tools or enhancements to existing tools and become the tools "champion" throughout the tool's life cycle
You will document all work performed on the client's behalf daily where you will comment on what tools were used and devices that were identified and accessed
You will pro-actively identify, define, and advocate technical processes, approaches, and concepts to enhance/improve exploitation efforts
You will write and produce high-quality technical reports related to the scope, nature, and characteristics of the client's technical objective that is suitable for dissemination to both technical and nontechnical audiences
You will analyze software, firmware and hardware using a variety of reverse engineering techniques to understand possible security vulnerabilities and potential misconfigurations, working closely with teammates who value innovation and execution
You will performing in-depth analysis (dynamic/static) on malicious software based platforms to provide actionable intelligence; as appropriate, provide remediation recommendations
You will analyze, disassemble, and reverse-engineer malicious code; documenting and transitioning results in reports, presentations, and technical exchanges
You will travel OCONUS for approximately 2 months at a time, with 2-months CONUS in-between cycles.
You’ll Bring These Qualifications:
Possess an active TS/SCI with required polygraph clearance
2+ years of experience
Moderate to heavy experience with Open Source Intelligence technologies such as: Metasploit, BurpSuite, nmap, and Wireshark. Experience with proprietary tools to perform red teaming and penetration testing.
Worked with Ansible, Puppet or Chef for automation of deployment of server software packages
Experience with programing languages such as Python, Shell, Assembly, C/C++
Familiar with embedded Internet of Things systems, the protocols they use for discovery and communications and the dangers they can present
Understand the concepts behind software defined radios (SDR) and how to capture and alter capture RF communications
Ability to combine components into a functioning multi-layer network of heterogeneous devices and applications
Working knowledge of Microsoft Windows Operating System and/or U*NIX
Working knowledge database Administration and application development with Oracle, PostresSQL, SQL Server, and/or MySQL
These Qualifications Would be Nice to Have:
Advanced GIAC and/or (ISC)2 network/cyber security specialties
Familiar with 802.11, Bluetooth and LTE protocols and technologies
Experience with wired telephony technology (hardware or core software)
Familiar with mobile telephony technology (hardware or core software)
Experience with ubiquitous core network device (switch/router/hub) technology (hardware or core software)
What You’ll Get to Do:This section should describe the overarching summary of the job and what is appealing about the opportunity.More About the Role:This section should outline the primary responsibilities of the position.You’ll Bring These Qualifications:This section should include required qualifications, including Years of Experience as outlined in the Job Leveling Guide. Remember, if your contract contains minimum Labor Category Qualifications, they must be included.These Qualifications Would be Nice to Have:This section should include and preferred or desired qualifications or attributes.What We Can Offer You:- We’ve been named a Best Place to Work by the Washington Post.- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.- We offer competitive benefits and learning and development opportunities.- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.- For over 55 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
CACI employs a diverse range of talent to create an environment that fuels innovation and fosters continuous improvement and success. At CACI, you will have the opportunity to make an immediate impact by providing information solutions and services in support of national security missions and government transformation for Intelligence, Defense, and Federal Civilian customers. CACI is proud to provide dynamic careers for employees worldwide. CACI is an Equal Opportunity Employer - Females/Minorities/Protected Veterans/Individuals with Disabilities.