Enterprise Information Services, Inc.

  • Exploit Analysis Subject Matter Expert

    Job Location US-VA-Quantico
    # of Openings
    Targeted Job Start Date
  • Overview

    This position requires capabilities necessary to review exploit codes, their associated vulnerabilities, discover enterprise security discrepancies, assess associated risk, and assist in the development of remedial action. Conduct a thorough analysis of the capabilities and effects of adversary tactics, techniques, and procedures within the network in order to improve the overall defense posture. Support the discovery of vulnerabilities in the production environment including no-notice external security assessments.


    • Conduct, analyze, and review penetration tests and Joint Red Team assessment results to develop recommendations to protect the Enterprise Network
    • Analyze and review application, system, and network security postures across the Enterprise Network in both lab and production environments through active scanning, application-layer protocol fingerprinting, or traffic analysis
    • Evaluate identified targeted environments in the Enterprise Network for compliance with applicable DOD, DON, and other government IT security policies
    • Support the development and implementation of enterprise mitigation actions in response to complex vulnerabilities
    • Maintain a lab environment with current Enterprise Network and defensive configurations in order to test adversary tactics, techniques, and procedures against a mock Enterprise Network
    • Develop the processes and procedures for replaying network attacks/compromises within a lab environment in order to scope the situation and develop recommended mitigation actions
    • Support the creation of a repeatable data analysis process which identifies attributes and indications of targeted activity for profile development within the DCOS sensor grid
    • Provide support required to maintain the Government’s CSSP accreditation per the standards set forth in the CSSP program manual, DOD -8530.1-M, to include documentation and technical writing support as needed.



    • BS degree from an accredited institution, or 8 years of experience in lieu of degree.


    • TS/SCI clearance required

    Knowledge and Experience

    • At least five years of experience performing various assessments (penetrations tests of systems and networks within a DOD Network Environment of enclave).
    • At least five years of experience developing exploit code for network and system penetration testing.
    • At least five years of experience performing penetration testing of web applications
    • At least five years of experience developing specialized applications for the assessment and security testing of web applications.
    • At least five years of experience developing and maintaining custom applications that exploit known system vulnerabilities or system mis-configurations to configurations to gain system command and control during red team operations.
    • Knowledge DOD security controls to include DISA Secure Technical Implementation Guidelines (STIG) and the DOD IA Certification and Accreditation Process and Risk Management Framework (RMF).


    • Possess IAT Level III certification; One of the following certifications required - CASP CE, CCNP Security, CISA, CISSP, GCED, GCIH.

    EIS is an Equal Opportunity Employer/M/F/V/Disabled.


    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed