Parsons is looking for a Software Engineer to join their Red Cyber team to develop offensive capabilities, including exploits, shellcode, and bypassing mitigations, as well as conduct malware analysis and software vulnerability research.
Requirements
- Proficient in C and C-Sharp and BOFs
- Experience with C2 frameworks, especially Cobalt Strike
- Experience with host-based computer forensics, network-based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetration testing, security operations center analysis, defensive cyber operations, or offensive cyber operation
- Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research, or software exploit development
- Experience in the development of Windows kernel modules
- Strong familiarity with Windows Active Directory
- Experience developing exploits, shellcode, and bypassing mitigations such as nonexecutable stack (NX) and ASLR as well as more advanced exploit mitigations
Responsibilities
- Offensive capability development
- Develop exploits, shellcode, and bypassing mitigations
- Conduct dynamic analysis
- Malware development, analysis and software vulnerability research
Other
- 5+ years of relevant experience, including software development and offensive security
- Active TS/SCI Clearance
- Must pass the Red Team developer aptitude test
- Must be able to travel 15%- OCONUS and CONUS locations
- An active Top Secret SCI security clearance is required for this position.