top of page

Computer Exploitation Engineer VAD RED-Mid-Level 119-012

SysEng.png

See a complete list of our open positions

Apply at the Bottom of the Page

IC-CAP LLC is a Woman Owned / HUBZone Small Business working in the Department of Defense and Intelligence Community.  We are always looking for highly talented, energetic, and dynamic professionals that are interested in protecting the defense of our nation.  

Some of the positions are future positions.  Please look at the opening line of the job description to determine if this is an open or future position.

 

Our positions are not remote unless stated in the job description below.

We are looking to fill this position at the following location(s):

    Fort Belvoir, VA

Job Description

Computer Exploitation Engineer VAD RED-Mid-Level:



Conducts all-source analytic production of future and current leading-edge technologies and their military applications worldwide. Projects the discovery, development, and deployment of advanced technologies and their potential impact on U.S. forces worldwide. Provides risk assessments on the transfer and diversion of defense and dual-use U.S. technologies and assesses national security implications associated with foreign involvement in critical U.S. defense technology and defense sectors. Produces intelligence for the U.S. National, Defense and Acquisition Communities. Conducts all-source analysis to identify, exploit, and assess potential threats, transfer, and vulnerabilities to defense supply chains.




Mid-Level:


  • Demonstrates working knowledge of the concepts involved in the specific functions outlined in the specified labor category description.

  • Knowledgeable of and demonstrates ability to apply IC and DoD classification guidelines and procedures.

  • Demonstrates ability to use logic and systematic approaches to gather, evaluate, and synthesize multiple sources of information.

  • Demonstrates ability to work semi-independently with oversight and direction.

  • Demonstrates ability to use logic when evaluating and synthesizing multiple sources of information.

  • Demonstrates ability interpreting analysis to include, but is not limited to, its meaning, importance, and implications.

  • Demonstrates ability to defend analytic judgements with sound, logical conclusions and adapt analytic judgments when presented with new information, evolving conditions, or unexpected developments.

  • Demonstrates ability to produce timely, logical, and concise analytic reports, documents, assessments, studies, and briefing materials in formats including Microsoft Office tools (e.g. Excel, Word, PowerPoint, etc.), electronic / soft copy matrices and / or web-enabled formats.

  • Demonstrates ability to communicate complex issues clearly in a concise and organized manner both verbally and non-verbally, with strong grammar skills.

  • Demonstrates proficiency using Microsoft Office tools.

  • Demonstrates ability to develop structured research including, but not limited to, obtaining, evaluating, organizing, and maintaining information within security and data protocols.

  • Demonstrates ability to recognize nuances and resolve contradictions and inconsistencies in information.

  • Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category.

  • Demonstrates ability to work independently with minimal oversight and direction.

  • Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution.

  • Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.

  • Demonstrates ability to guide teams in researching multifaceted or critical problems.

  • Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category.

  • Demonstrates the ability to communicate understanding from information that may be incomplete, indirect, highly complex, seemingly unrelated, and / or technically advanced.

  • Demonstrates ability to structure analysis based on trends in reporting and a range of analytic perspectives from other analysts, organizations, and intelligence disciplines.

  • Demonstrates ability to work independently with minimal oversight and direction.

  • Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution.

  • Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.

  • Demonstrates ability to lead teams in researching multifaceted or critical problems. Provides guidance in selecting, designing, and applying analytic methodologies. Uses argument evaluation and validated analytic methodologies to challenge differing perspectives.




Job Duties:


  • Assess computer network defense and information assurance in support of customer organizations.

  • Provide certified and experienced vulnerability assessment analysts to conduct off-site system vulnerability, network architecture, policy and procedure, application, and system integrity reviews.

  • Assist with development and maintenance of red team detachment assessment methods, tools, and techniques.

  • Perform code review in order to find vulnerabilities.

  • Perform protocol and input fuzzing in order to find vulnerabilities.

  • Perform analysis of disassembled code when source code is unavailable.

  • Develop exploits based on identified vulnerabilities.

  • Recommend fixes and mitigation for identified vulnerabilities.

  • Create/maintain adversary emulation toolsets/development.

  • Contribute to technical and executive summaries of Red Team missions.

  • Document tools, techniques, processes, and procedures.





Education and Experience:


  • At least 8 years of experience conducting analysis relevant to the specific labor category with at least a portion of the experience within the last 2 years.

  • Bachelor's degree in an area related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education.




Training and Certifications:

  • IAT Level 3

  • Windows Computing Environment (CE)   Certification

  • Linux CE Certification

  • Offensive Security Certified Professional (OSCP) or GIAC Penetration Tester (GPEN)

  • Python Certification,

  • CCNA / Routing and Switching, and Red Team Apprentice or Offensive Methodology Analysis or Red Team Operations Course.





Security Clearance:


  • TS SCI

You are applying for the position of 
Computer Exploitation Engineer VAD RED-Mid-Level 119-012
Upload Your Resume
bottom of page