AASKI Technology, Inc.

  • Test Engineer

    Job Location US-MD-Aberdeen Proving Ground
    Posted Date 4 weeks ago(11/23/2018 11:37 AM)
    Job ID
    2018-2696
    # of Openings
    1
    Category
    Engineering
  • Overview

    AASKI Technology is a dynamic government services and solutions provider to multi-faceted Military and Commercial sectors. By creating a highly stable work environment centered on fulfilling our customers’ needs, AASKI fosters a challenging work environment for its employees. 

    Responsibilities

    US Citizenship and the ability to maintain a DoD security clearance required.

     

    The candidate must be able to work in a team environment, self-starter with good communication skills, and have the ability to perform penetration testing distributions such as Kali Linux, Parrot, or BlackArch. Must be Proficient with network enumeration techniques and tools such as nmap, Wireshark, TCPdump. Must be able to perform network and web application penetration testing. Must be able to read/understand source code and make changes and/or debug if necessary.

    Qualifications

    • Active Secret security clearance required. Top Secret clearance preferred
    • 8+ years of experience required
    • Degree in a related field required
    • Must be able to work in a lab environment
    • Hands on experience with Linux and Windows operating systems
    • Experience with debuggers
    • Experience with network, web application penetration testing
    • Certifications: Certified Ethical Hacker, Security+, RHCSA (required) OSCP, OCWP, OSCE (optional)
    •  Ability to use/configure virtual environments and familiarity with any of the following:
      • Vmware
      • Virtualbox
      • Kvm
      • ESXi
    • In depth knowledge of CNA and/or CND.
    • Experience with packet analysis
    • Knowledge of the OSI layer and how it contributes to multiple aspects of the security of a system.
    • Ability to analyze emerging threats and leverage defensive techniques to mitigate risk
    • Ability to understand computer exploitation from both a network and application level.
    • Ability to perform advanced research and development and apply concepts to defensive techniques.
    • Ability to custom tailor exploits to fit the current Target of Evaluation (TOE).
    • Preferred but not required:
      • Experience reverse engineering binaries
      • Experience reverse engineering web applications
      • Knowledge of software defined networking (SDN)
      • Red team experience
      • Wireless penetration testing experience
      • Ability to create custom exploits as needed.
      • Programming/scripting language ability. E.g. Python/Perl/C/C++
      • Experience with x86 Assembly or other versions
    • Minimum of 15% travel required

    AASKI provides an excellent package of comprehensive benefits for full-time employees beginning the first day of employment.

    • Medical, Dental and Vision insurance.
    • 10 Paid Holidays; 3 weeks Paid Time Off.
    • 401k Retirement Plan with employer match.
    • Life Insurance and AD&D; Voluntary Supplemental Life Insurance and AD&D.
    • Long and Short Term Disability.
    • Flexible Spending Account.
    • Discounted Legal Service, Income Protection, Discounted Home & Auto.
    • And more!

    Experience working in a CMMI Level 3 project/business environment a plus for all open positions. US Citizenship and the ability to obtain and maintain a Security clearance required. Equal Opportunity Employer Minorities/Women/Veterans/Disabled. Solicitations/Advertisements for Employees shall state that all qualified applicants will receive consideration for employment without regard to their veteran status or on the basis of disability. All employees of the Company are employed “At Will.” This means that either the employee or the Company is free to end the employment relationship at any time, for any reason, with or without cause and with or without notice.

    Apply for this Job

    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed