Clearance: Active TS/SCI required
Travel: ~5%
The Mission
Design, build, and validate exploit and implant toolchains used in realistic adversary emulation. Your engineering work will enable red team operations that inform senior DoD mission-assurance decisions.
What You’ll Do
- Develop exploit code, in-memory loaders, kernel/userland persistence, and covert tooling.
- Test and harden payloads to minimize detection by EDR/AV.
- Integrate exploits into operational toolchains and assist operators during live assessments.
- Produce technical annexes and concise executive/technical briefings.
Required
- Active TS/SCI (U.S. citizen).
- Proficient in C/C++, assembly, and Windows internals (kernel & Win32 APIs).
- Demonstrated exploit development experience (memory corruption, ROP, bypass mitigations).
- Ability to pass the DCART Senior Developer Aptitude Test (SDAT).
Preferred
- Experience with C2 frameworks; Cobalt Strike experience is a plus (nice-to-have, not mandatory).
- OSEP/OSEE/OSCP/GREM/GXPN or equivalent practical creds.
- Experience building operational-grade implants and delivery pipelines.
Apply: cleared resume, 1–2 page technical write-up (no classified info), and readiness for SDAT.