Tallahassee, Florida, United States Hybrid / WFH Options
Tallahassee State College
new and existing processes/tasks. Research and train on new techniques and developments in server/cloud technologies. Creates reports utilizing reporting and dataextraction tools, such as PowerShell, Graph, and/or Excel. Ensures the security of the systems by researching/implementing new security solutions More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Oak Grove Technologies
by replicating their operations to assess and protect against security threats Utilize publicly available information on the internet to discover weaknesses, vulnerabilities, and compromised data Conduct cyber operations against U.S. government entities to enhance cybersecurity, detect potential threats, and suggest ways to address vulnerabilities Apply advanced knowledge of offensive … cyber strategies, including reconnoitering, infiltration, network exploration, and dataextraction, to simulate adversarial attacks and identify weaknesses during red team assessments. Qualifications Expertise as a Reverse engineer analyzing source code to develop tools or exploits. Expertise with Script or develop in one or more language (e.g., C, C++ More ❯