Cyber Threat Emulator (CTE)

Incumbent assesses an organization’s security posture with a focus on non-permissive network/IS access.  Engage the assessed organization’s security by emulating specific TTPs used by a known adversary to identify unmitigated vulnerabilities through simulated exploitation or attacks on DOD cyber resources.  Detect and emulate adversary TTPs, while conducting overall vulnerability analysis, and providing risk mitigation support with an emphasis on IA Compliance.

Knowledge of: application vulnerabilities; basic system, network, and OS hardening techniques; certified ethical hacking principles and techniques; data backup and restoration concepts; network architecture concepts including topology, protocols, and components; network security architecture, including the application of Defense-In-Depth principles; network traffic analysis methods; OSI model and underlying networking protocols (e.g. TCP/IP); penetration testing tools and techniques (e.g. metasploit, neosploit, etc.); programming language structures and logic; relevant laws, legal authorities, restrictions, and regulations pertaining to CND activities; system administration concepts for Unix/Linux and/or Windows operating systems; the common networking protocols, services (e.g., web, mail, DNS), and how they interact to provide network communications; what constitutes a “threat” to a network.

Applicants that do not meet the minimum requirements will not be considered for the position

Please send a resume to e-mail, or call 210.822.8712 for other accommodations.

X Technologies is an Equal Opportunity Employer