Job Summary
As a CNE Expert, you’ll conduct vulnerability analysis, exploitation review, and assessments against devices to work with vendors and partners to identify and patch vulnerabilities in their systems. You will work with customers and partners to identify vulnerabilities, demonstrate proof-of-concept exploitation, and work to ensure patching to enable defense. Safeguard the future with us and develop offensive cyber operations that are essential to providing national security for today and tomorrow.
- Minimum Qualification: Degree
- Experience Level: Mid level
- Experience Length: 8 years
Job Description/Requirements
Nice To Have:
- 8+ years of experience as a Vulnerability Analyst
- 5+ years of experience with CNE, networking, telecommunication systems, or analysis
- Experience as an offensive cyber subject matter expert
- Experience with development using Python, Ruby, or Perl to automate analysisÂ
- Experience with penetration testing against Linux-based devices
- Experience performing threat and vulnerability analysis and management, including identification of threats and vulnerabilities, testing and evaluation of mitigation strategies, recommendations for mitigation strategies, implementing mitigations, validation of effectiveness of mitigations, and thoroughly documenting throughout the process
- Knowledge of access mechanisms, including vulnerabilities or exploits, and alternative access methods or platforms, and operational tooling, including implants, payloads, persistence, and C2
- Bachelor's degree
Nice If You Have:
- Experience using containers or Virtual Machines (VMs) to perform tasks, including deploying software services, or performing security analysis of said systems
- Experience with Linux, with strong command line competency, simple bash scripting, and installing and debugging software services
Important Safety Tips
- Do not make any payment without confirming with the Jobberman Customer Support Team.
- If you think this advert is not genuine, please report it via the Report Job link below.