
Target Analyst Reporter
Reflexive Concepts, Linthicum, MD, United States
Reflexive Concepts is seeking a skilled Target Analyst Reporter to join our team!
The ideal candidate will meet the following requirements:
Qualifications:
At least seven (7) years experience [four (4) years experience with a B.S.] in two (2) or more of the following:
Computer Network Exploitation
Vulnerability Assessment
Penetration Testing
Incident Response
Network and/or server forensics
Cryptanalytic work in military or intelligence community organization
Cryptology in military or intelligence community organization
At least one (1) year of experience in two (2) or more of the following :
File Hashing and Fuzzy FileHashing (e.g., ssdeep, fciv, and md5deep)
Commercial, open source or GOTS tools for intrusion detection (e.g., Snort, BroIDS)
Packet capture/evaluation (e.g., tcpdump, ethereal/wireshark, NOSEHAIR)
Network mapping/discovery (e.g., nmap, TRICKLER)
Industry standard system
etwork tools (e.g., netcat, netstat, traceroute, rpcinfo, nbtscan, snmpwalk, Sysinternals suite)
At least two (2) years of experience in one (1) or more of the following:
Development of exploits for Microsoft Windows operating systems
Development of exploits for UNIX operating systems
Development of exploits for personal computer device/mobile device operating systems (e.g., Android, Blackberry, iPhone, and iPad)
Software Reverse Engineering to include use of code disassemblers (e.g., IDA Pro) and debugging unknown code (e.g., Ollydbg)
Analysis of code in memory, including analysis of RAM snapshots, Windows crash dump files, and/or UNIX kernel dumps
Implementing networks with IPv6 protocols
#J-18808-Ljbffr
The ideal candidate will meet the following requirements:
Qualifications:
At least seven (7) years experience [four (4) years experience with a B.S.] in two (2) or more of the following:
Computer Network Exploitation
Vulnerability Assessment
Penetration Testing
Incident Response
Network and/or server forensics
Cryptanalytic work in military or intelligence community organization
Cryptology in military or intelligence community organization
At least one (1) year of experience in two (2) or more of the following :
File Hashing and Fuzzy FileHashing (e.g., ssdeep, fciv, and md5deep)
Commercial, open source or GOTS tools for intrusion detection (e.g., Snort, BroIDS)
Packet capture/evaluation (e.g., tcpdump, ethereal/wireshark, NOSEHAIR)
Network mapping/discovery (e.g., nmap, TRICKLER)
Industry standard system
etwork tools (e.g., netcat, netstat, traceroute, rpcinfo, nbtscan, snmpwalk, Sysinternals suite)
At least two (2) years of experience in one (1) or more of the following:
Development of exploits for Microsoft Windows operating systems
Development of exploits for UNIX operating systems
Development of exploits for personal computer device/mobile device operating systems (e.g., Android, Blackberry, iPhone, and iPad)
Software Reverse Engineering to include use of code disassemblers (e.g., IDA Pro) and debugging unknown code (e.g., Ollydbg)
Analysis of code in memory, including analysis of RAM snapshots, Windows crash dump files, and/or UNIX kernel dumps
Implementing networks with IPv6 protocols
#J-18808-Ljbffr