We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results

Development Tester, CI/ID (onsite) Cyber Security

TechSource
United States, Virginia, Fort Belvoir
8725 John J. Kingman Rd (Show on map)
Feb 07, 2025

Position Description

Join the Defense Threat Reduction Agency (DTRA) as a member of the elite DoD Red Team's newest component, the DTRA Cyber Assessment Red Team (DCART), where you will be at the forefront of assessing vulnerabilities and identifying risks to critical assets and missions. You will challenge protection strategies from an adversarial perspective, providing invaluable insights that drive mission assurance and be key to safeguarding our nation's security.

You will collaborate with top-tier DoD stakeholders, including the Joint Chiefs of Staff and Combatant Commanders, to deliver actionable intelligence that enhances our defense capabilities. Your work will involve both analytical and physical assessments, as well as contributing to the cutting-edge DTRA Cyber Assessment Red Team (DCART). By conducting comprehensive cyber assessments, you will help create a holistic view of adversarial threats, ensuring our national security remains robust and resilient.

This is your chance to make a tangible impact on national defense, working alongside dedicated professionals to prevent, protect, and mitigate threats to our nation's most critical operations. Join us and be part of a mission that truly matters.

May travel to support assessments CONUS and OCONUS (anticipated ~15%). Must be able to support assessments during non-standard duty hours, to include nights and weekends.

Job Description: The Development Tester must have 1-3+ years' experience in software analysis, test, and evaluation, which may be described as any activities to characterize, profile, and/or validate software such as: source code review/analysis, dynamic/performance testing and evaluation, algorithm assessment, or open-source research on cyber-related vulnerabilities and exploitation development. They should have experience with modern programming languages such as: C, C++, C#, Java, or Python.

  • A strong understanding of red teaming or offensive cyber activities and attack methodologies that underpin tool requirements
  • Background in red team or offensive cyber development, primarily focused on post-exploitation tools and defense evasion
  • Experience with Win32APIs
  • Experience in DevSecOps principles and familiarity with automated code testing and CI/CD pipelines
  • Ability to implement/maintain developer infrastructure, including diagnosing/remediating issues as they arise. Developer infrastructure concepts include but are not limited to: CI/CD pipelines, artifact repositories (Nexus), LDAP
  • Experience in AV/EDR evasion
  • Experience with mission-driven rapid development in support of cyber operations
  • Top Secret SCI Clearance
Applied = 0

(web-7d594f9859-5j7xx)