Share this Job

Cyber Security Technical Professional (Offensive Computing)

Date: Nov 26, 2021

Location: Oak Ridge, TN, US, 37830

Company: Oak Ridge National Laboratory

Requisition Id 4668 



Oak Ridge National Laboratory (ORNL) is seeking qualified Offensive Computing Technical Professionals. The position will support both the Cybersecurity Research Group (CyR) and ORNL’s security operations. The CyR Group conducts research and development on artificial intelligence- and machine-learning-driven cyber defense methods, tools, and techniques that are designed to protect our nation’s critical computer systems and networks. Recent examples of CyR Group research include ML-based network and user emulation and multi-step adversarial campaigns against this network to enable large-scale experiments of network defense tools. The position also will support ORNL’s cyber operations through red teaming and penetration testing exercises.


The CyR Group sits in the National Security Sciences Directorate, which conducts research and development to confront some of the nation’s most difficult security challenges and adversaries.  Our directorate houses S&T leadership in cybersecurity and cyber-physical resiliency, data analytics, geospatial science and technology, nuclear nonproliferation, and high-performance computing for sensitive national security missions. We draw on the Laboratory’s exceptional facilities and work closely with leading researchers in other areas at the lab such as nuclear and chemical sciences and engineering, applied materials, advanced manufacturing, biosecurity, transportation, and computing.  Our multi-disciplinary research teams are passionate about discovery and innovation as we create science-based responses to complex security threats to public safety, national defense, energy infrastructure, and the economy.



Job Duties & Responsibilities:

In this role you will lead tasks with the assistance of a budding red team to deliver innovative offensive computing solutions both for research and cyber operational needs. This involves working in diverse teams of computer scientists, data scientists, and engineers on large-scale, multi-faceted projects that require red-team and blue-team interplay. Your experience in designing, implementing, and executing a wide variety of adversarial campaigns will be needed to ensure success in testing tools, studying and strengthening security operators, and creating useful datasets. Ongoing learning of novel tools and techniques is required. Ability to communicate to team members of diverse backgrounds as well as non-technical audiences will be necessary.


Your leadership will be critical in driving the strategic direction of ORNL’s red team into a world-class offensive computing team. Understanding novel threat techniques, proficiency with offensive toolboxes (e.g., Cobalt Strike, MetaSploit), and understanding a roadmap of skills to continually improve abilities is expected. It is expected that you will lead by example, exhibiting operational and research integrity, and impactful delivery of results.




  • Bachelors degree in Computer Science, Mathematics, or related field
  • Experience with Windows, Linux, Unix and MAC OSs - including bash and PowerShell
  • Strong programming skills, in particular, experience with Python, Git, C
  • Shell scripting for automation of tasks
  • Systems programming experience
  • Understanding of common network protocols and covert channels
  • Proficiency with security scanners (OpenVAS, Nessus, BurpSuite, etc.)
  • Proficiency and working knowledge of many offensive tools and C2 frameworks, e.g., Metasploit, Cobalt Strike, Empire Shell, etc.
  • Understanding of APT tactics, techniques and procedures (Familiar with the MITRE ATT&CK Matrix and the application of the tactics and techniques presented)
  • Development experience modifying or extending proof-of-concept exploits and exploit tools
  • Threat intelligence analysis
  • Ability to communicate technical content to technical and non-technical audiences
  • Ability to document codes, ideas, and workflows for reproduction and in support of academic publications
  • Ability to help mentor and lead by example in developing red teaming skills in younger staff members




  • Offensive computing certifications (OSCP, OSCE, AWAE, GPEN, GWAPT, etc.)
  • Strong understanding of at least one CPU architecture (x86, ARM, etc.)
  • Proficiency in reverse engineering (IDA Pro, Ghidra, etc.) and fuzzing (AFL, wfuzz, etc.)
  • Deep understanding of vulnerability classes and associated exploits (memory corruption exploitation via ROP chains, command injection, etc.)
  • Understanding of modern defenses (ASLR, DEP, canaries, antivirus) and defense bypasses.



Special Requirement:

This position requires the ability to obtain and maintain a clearance from the Department of Energy. As such, this position is a Workplace Substance Abuse (WSAP) testing designated position. WSAP positions require passing a pre-placement drug test and participation in an ongoing random drug testing program.


This position will remain open for a minimum of 5 days after which it will close when a qualified candidate is identified and/or hired.

We accept Word (.doc, .docx), Adobe (unsecured .pdf), Rich Text Format (.rtf), and HTML (.htm, .html) up to 5MB in size. Resumes from third party vendors will not be accepted; these resumes will be deleted and the candidates submitted will not be considered for employment.

If you have trouble applying for a position, please email

ORNL is an equal opportunity employer. All qualified applicants, including individuals with disabilities and protected veterans, are encouraged to apply.  UT-Battelle is an E-Verify employer.

Nearest Major Market: Knoxville