About the Role
<b>Location: </b>"Hybrid in Arlington area"<br />
<b>Clearance:</b> <b>Active TS/SCI required</b><br />
<b>Travel:</b> ~5%<br />
<b>The Mission</b><br />
Design, build, and validate exploit and implant toolchains used in realistic adversary emulation. Your engineering work will enable red team operations that inform senior DoD mission-assurance decisions.<br />
<b>What You’ll Do</b>
<ul>
<li>Develop exploit code, in-memory loaders, kernel/userland persistence, and covert tooling.</li>
<li>Test and harden payloads to minimize detection by EDR/AV.</li>
<li>Integrate exploits into operational toolchains and assist operators during live assessments.</li>
<li>Produce technical annexes and concise executive/technical briefings.</li>
</ul>
<b>Required</b>
<ul>
<li>Active <b>TS/SCI</b> (U.S. citizen).</li>
<li>Proficient in C/C++, assembly, and Windows internals (kernel & Win32 APIs).</li>
<li>Demonstrated exploit development experience (memory corruption, ROP, bypass mitigations).</li>
<li>Ability to pass the <b>DCART Senior Developer Aptitude Test (SDAT)</b>.</li>
</ul>
<b>Preferred</b>
<ul>
<li>Experience with C2 frameworks; <b>Cobalt Strike experience is a plus</b> (nice-to-have, not mandatory).</li>
<li>OSEP/OSEE/OSCP/GREM/GXPN or equivalent practical creds.</li>
<li>Experience building operational-grade implants and delivery pipelines.</li>
</ul>
<b>Apply:</b> cleared resume, 1–2 page technical write-up (no classified info), and readiness for SDAT.