NetSage’s mission is to help our customers achieve their missions by providing superior cyber services. We seek talented professionals who are interested in doing meaningful, mission-focused work for the U.S. Federal Government. We are a growing Company that puts our employees first and offers excellent pay and world-class benefits. We do not hire contract by contract; instead, we offer multiple job options and career progression for our employees. We realize that our website and job descriptions may be a little vague and that’s on purpose because of the customers we support. Please connect with us using our Contact Us page if you have any questions about any of our job-openings.
We are seeking an Ethical Hacker to support a team that conducts Adversary Emulation for cyber exercises in support of our customer. You will research and develop various cyber threat actor Tactics, Techniques, and Procedures (TTPs) and environments and integrate such findings in Opposition Force (OPFOR) threat emulation. The Ethical Hacker will also utilize relevant Cyberspace Operation tools used for the customer mission during exercises; provide briefings of your emulated intrusion set activity during these exercises to partner organizations and agencies; organize training for other team members on analysis methods, new exploit TTPs, and reporting methodologies; and serve as a Subject Matter Expert for working groups and meetings with partner organizations and agencies and generate reports as required on development efforts. Please consider applying if you have the required qualifications and experience.
Required Qualifications:
- TS/SCI with polygraph
- A bachelor’s degree in Computer Science, Information Systems, or a related discipline from an accredited college or university. In lieu of a degree, one or more of the following accredited certifications is required: Offensive Security Certified Professional (OSCP), Offensive Security Experienced Penetration Testers (OSEP), Practical Network Penetration Tester (PNPT), and/or GIAC Penetration Tester (GPEN).
- At least five (5) years of continuous work experience in the Cyber Mission Force (CMF) working directly with, or in-support of, Cyber Operations (CO).
Desired Experience:
- POSHC2, Cobalt Strike, or Metasploit experience
- Cyber threat emulation experience
- Cyber exercise support experience
- Exploit database and MITRE ATT&CK framework knowledge
- OPFOR or BLUFOR experience
- Capture the Flag experience
- Reverse engineering tool experience