RiVidium Inc (dba, TripleCyber) is seeking a Cyber Operator who will conduct collection, processing, and/or geolocation of systems to exploit, locate, and/or track targets of interest. Performs network navigation, tactical forensic analysis, and, when directed, executing on-net operations.
TASKS:
- Analyze internal operational architecture, tools, and procedures for ways to improve performance.
- Analyze target operational architecture for ways to gain access.
- Collaborate with development organizations to create and deploy the tools needed to achieve objectives.
- Conduct access enabling of wireless computer and digital networks.
- Conduct collection and processing of wireless computer and digital networks.
- Conduct exploitation of wireless computer and digital networks.
- Conduct network scouting and vulnerability analyses of systems within a network.
- Conduct on-net activities to control and exfiltrate data from deployed technologies.
- Conduct on-net and off-net activities to control, and exfiltrate data from deployed, automated technologies.
- Conduct open source data collection via various online tools.
- Conduct survey of computer and digital networks.
- Deploy tools to a target and utilize them once deployed (e.g., backdoors, sniffers).
- Detect exploits against targeted networks and hosts and react accordingly.
- Develop new techniques for gaining and keeping access to target systems.
- Edit or execute simple scripts (e.g., Perl, VBScript) on Windows and UNIX systems.
- Exploit network devices, security devices, and/or terminals or environments using various methods or tools.
- Facilitate access enabling by physical and/or wireless means.
- Identify potential points of strength and vulnerability within a network.
- Maintain situational awareness and functionality of organic operational infrastructure.
- Operate and maintain automated systems for gaining and maintaining access to target systems.
- Conduct cyber activities to degrade/remove information resident in computers and computer networks.
ABILITIES:
- Skill in analyzing memory dumps to extract information.
- Skill in analyzing target communications internals and externals collected from wireless LANs.
- Skill in analyzing terminal or environment collection data.
- Skill in assessing current tools to identify needed improvements.
- Skill in auditing firewalls, perimeters, routers, and intrusion detection systems.
- Skill in data mining techniques (e.g., searching file systems) and analysis.
- Skill in determining installed patches on various operating systems and identifying patch signatures.
- Skill in extracting information from packet captures.
- Skill in identifying the devices that work at each level of protocol models.
- Skill in interpreting vulnerability scanner results to identify vulnerabilities.
- Skill in knowledge management, including technical documentation techniques (e.g., Wiki page).
- Skill in processing collected data for follow-on analysis.
- Skill in providing real-time, actionable geolocation information utilizing target infrastructures.
Requirements:
- Master degree or higher from an accredited college or university
- Prefer an accredited Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering degree; or a degree in a Mathematics or Engineering field.
- IAT Level 2 and Two Penetration Testing Certifications w/ At Least One Being an Advanced Certification (e.g., OSCP, OSCE, OSEE, GSE, GXPN, CPT)