Red Team Analyst Contract in Washington, DC at GDH

Date Posted: 9/29/2018

Job Snapshot

  • Employee Type:
    Full-Time
  • Job Type:
  • Experience:
    Not Specified
  • Date Posted:
    9/29/2018
  • Job ID:
    TJ-637

Job Description

Title: Red Team Analyst

Location: Washington D.C.

Duration: 12+ Months

GDH is seeking a Red Team Analyst to work on-site with a Federal client in Washington D.C. for a long-term contract opportunity.

Overview:

  • Become an integral part of a diverse team that leads the world in the Mission, Cyber, and Intelligence Solutions group.  With us, you will help protect our national security while working on innovative projects that offer exciting challenges, and opportunities for advancement
  • We are currently seeking a motivated, career and customer oriented Red Team Member/Cyber Security Forensic Intrusion Analyst to join our Advanced Capabilities Team in the heart of Washington D.C. to provide unparalleled support to our customer and to begin an exciting and rewarding career with a diverse team of Cyber Security Professionals.               
  • Proven ability to work in a diverse customer needs driven environment
  • Team oriented to share best practices and always strive for improvement
  • Highly skilled in both written and verbal communication
  • Ability to write comprehensive reports regarding computer forensic and intrusion / analytical findings
  • Research tools, techniques, countermeasures and trends in network vulnerabilities, data hiding and network security
  • Assist in deterring, identifying, monitoring, investigating, and analyzing computer network intrusions

Required Qualifications

  • Overall 3+ years of Information Security experience
  • At least 1-year experience performing application security assessments
  • 2+ years Red Team experience
  • Knowledge of networking fundamentals (all OSI layers)
  • Offensive pen testing experience
  • Knowledge of the Windows and *NIX operating systems to include boot process through understanding of the execution flow of boot time processes
  • Knowledge of software exploitation (web, client-server, mobile, and wireless) on modern operating systems. Familiarization with XSS, SSJS, filter bypassing, SQL Injection, etc.
  • Familiarity with interpreting log output from networking devices, operating systems and infrastructure services
  • Familiarity with common reconnaissance, exploitation, and post exploitation frameworks.
  • Highly Inquisitive mindset
  • OSCP certification

Preferred Qualifications:

  • Bachelor's Degree in Engineering, Business Management, or Technology related fields a major plus
  • Knowledge of malware packing and obfuscation techniques
  • Ability to automate tasks using a scripting language (Python, Perl, Ruby, etc).
  • Strong knowledge of networking protocols and packet analysis
  • Must have the ability to perform targeted penetration tests and exploitations without use of automated tools
  • Well versed in multiple security technologies such as Firewalls, IDS/IPS, Web Proxies and DLP among others
  • Demonstrated understanding of private sector, or other large organization, security and IT infrastructures
  • Proven career progression, ability to learn and grow in a demanding, customer needs driven environment