Red Team Software Developer
Dam Neck, VA, United States
Applications have closed
Millennium Corporation
Overview
For nearly two decades, Millennium Corporation has been operating on the leading edge of cybersecurity. Our elite team of more than 400 experts has an unparalleled record of performance supporting Red Team Operations, Defensive Cyber Operations, Software Engineering, and Technical Engineering. With the largest contingent of contracted Red Team operators in the DoD, we provide an unmatched level of threat intelligence and battle-tested experience for customers in both the DoD and federal civilian markets.
What We Believe
We believe that diversity is a fact, inclusion is a choice. At Millennium Corporation, we are inclusive. We celebrate multiple approaches and different points of view. We strongly believe that diversity drives innovation, and we are building a culture where differences are valued. We are always growing our programs and we offer tools to help our employees grow and manage their careers.
Millennium is an equal opportunity employer and does not discriminate or allow discrimination on the basis of race, color, religion, gender, age, national origin, citizenship, disability, veteran status or any other classification protected by federal, state, or local law. Millennium promotes affirmative action for women, minorities, disabled persons, LGBTQ+ and veterans.
Responsibilities
Millennium Corporation is hiring a Red Team Software Developer to work in Virginia Beach, VA. The candidate must have an active secret clearance with the eligibility to obtain TS/SCI clearance.
The ideal candidate will:
- Perform software development functions in support of customer’s Red Team mission to effectively portray opposition force Computer Network Attack, Computer Network Exploitation, and Computer Network Defense.
- Candidate will maintain proficiency in Red Team operations through occasional support and/or observations of Red Team events. Will supports mission and training events by creating new technical and non-technical solutions using an interdisciplinary approach to actively, and passively expose and exploit information system vulnerabilities.
- Conduct exploitation and vulnerability research, tool design and development (software/application/scripting/coding), support of Red Team operations, test lab configuration and administration, and other duties as assigned.
- Display inn depth understanding of emerging threats, vulnerabilities, and exploits.
Qualifications
- Candidate must have an active Secret clearance and ability to obtain TS/SCI clearance.
- Candidate must possess a Bachelor’s degree from an accredited college or university in computer science, information systems, engineering, scientific or a mathematics-intensive discipline or a Relevant Technical Discipline. Two years of relevant experience with an Associate’s degree will be considered the equivalent of a Bachelor’s degree. Four years of relevant experience will be considered equivalent to a Bachelor’s degree.
- Demonstrated ability to program and script in various languages, including (but not limited to): C/C++, C#, Python, Ruby.
- Demonstrate experience in using network protocol analyzers and sniffers, as well as ability to decipher packet captures.
- Conduct pentests on applications, systems and network utilizing proven/formal processes and industry standards.
- CEH/CISSP, or ability to obtain within 6 months of hire
Business Development
Assist with Business Development activities as required to support Millennium's strategic business objectives, which may include but not limited to participation in technical interviews, creation of technical documentation, general proposal writing support and proposal color reviews.
Physical Requirements
- Must be comfortable with prolonged periods of sitting at a desk and working on a computer.
- Must be able to lift up to 10-15 pounds at a time.
Travel Requirements
Less than 20%
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: C CEH CISSP Clearance Computer Science DCO DoD Exploit Exploits Mathematics Python Red team Ruby Scripting Threat intelligence TS/SCI Vulnerabilities
Perks/benefits: Team events
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Principal Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Manager Pentest H/F jobs
- Open Product Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Staff Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Chief Information Security Officer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Consultant SOC / CERT H/F jobs
- Open Cybersecurity Consultant jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open Senior Security Architect jobs
- Open Cybersecurity Specialist jobs
- Open Security Researcher jobs
- Open IT Security Engineer jobs
- Open Sr. Security Engineer jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open CISA-related jobs
- Open SaaS-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Security assessment-related jobs
- Open Java-related jobs
- Open Malware-related jobs
- Open Security Clearance-related jobs
- Open DevOps-related jobs
- Open IDS-related jobs
- Open Forensics-related jobs
- Open CEH-related jobs
- Open EDR-related jobs
- Open Kubernetes-related jobs