* Plan, coordinate, and conduct advanced Red Team assessments against DoD systems and networks * Simulate adversarial cyber tactics to evaluate...
* Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike * Mimic threat actor behavior...
Update your browser to have a more positive job search experience.
×