Ross Technologies, Inc. (RTGX) is a growing global IT solutions company. Our customers include the Department of Defense, The Department of State, State and Local Government and Commercial customers. We strive to allow our employees to meet their full human potential by providing career opportunities that challenge and maximize the limits of existing skill sets while as needed continuing to invest in our employee’s growth through training. We not only seek candidates that can adequately fill our available positions but, we seek out positions that meet our employees expectations, often moving them across contracts into progressively more responsible positions directed towards their career goals. I think you will find RTGX a refreshing change from the typical Defense Contractor. Thank you and referrals are always appreciated so feel free to share our opportunities. EOE
1. Provides expert analytic support at both network and server level to augment
Government team charged with identifying and characterizing anomalies on USG
2. Analyzes network packet information, computer OS system data, executable file
data, host data, and metadata in to identify and characterize anomalies on USG
3. Develops and analyzes exploitation tactics, techniques, and procedures for a wide
range of operating systems.
4. Provides reporting on activities, and assist in the development and optimization of
new and existing tools and techniques to enhance analytic capabilities.
1. At least seven (7) years experience in two (2) of the following: (Relevant degree
for a total of four (4) years may be applied to this requirement only.)
a. Computer Network Exploitation
b. Vulnerability Assessment
c. Penetration Testing
d. Incident Response
e. Network and/or server forensics
2. At least one (1) year of experience in two (2) of the following:
a. File Hashing and Fuzzy File Hashing (e.g., ssdeep, fciv, and md5deep)
b. Commercial, open source, or GOTS tools for intrusion detection (e.g., Snort,
c. Packet capture/evaluation (e.g., tcpdump, ethereal/wireshark, NOSEHAIR).
d. Network mapping/discovery (e.g., nmap, TRICKLER).
e. Industry standard system/network tools (e.g., netcat, netstat, traceroute,
rpcinfo, nbtscan, snmpwalk, Sysinternals suite).
3. At least two (2) years of experience in one (1) of the following:
a. Development of exploits for Microsoft Windows operating systems
b. Development of exploits for UNIX operating systems
c. Development of exploits for personal computer device/mobile device
operating systems (e.g., Android, Blackberry, iPhone, and iPad.)
d. Software Reverse Engineering to include use of code disassemblers (e.g.,
IDA Pro) and debugging unknown code (e.g. Ollydbg)
e. Analysis of code in memory, including analysis of RAM snapshots,
Windows crash dump files, and/or UNIX kernel dumps
f. Implementing networks with IPv6 protocols.
** When applying to this position, PLEASE ensure your resume speaks to the specific duties and requirements of the description. This will increase your chances for an interview.