Include:Analyze (reverse engineer) anomalous/malicious software and hardware firmware/binaries. Determine mitigation techniques and works with others to provide assistance and technical solutions for defensive resolution. Vulnerability assessments, penetration tests, and red teaming in Operational Technology (OT) and embedded system environments. Understanding of cybersecurity scenario development, testing generation, and developing and providing training for red teams against OT and embedded system infrastructure. Determine and assist others in determining incident response actions and recommending mitigation strategies. Organize and participate in the development and maintenance of custom code used to analyze network traffic and proprietary protocols, develop attack and defense methodology and code on high-risk computer networks. Develop technical solutions for information operations and analysis related to national security topics intrusion analysis, malware, systems and vulnerabili...Security, Research, Computer, Computer Science, Energy, Operations, Technology