Department
Ennovar
Campus Location
Wichita, KS - Other Wichita Location
Hire Type
Part Time
Pay
$18 - 25 per hour
Work Schedule
Based on class schdule
Export Compliance Requirement
This position requires access to EAR or ITAR controlled technologies. Applicants are required to be eligible for employment under U.S. export control laws and must meet the requirement of being a “U.S. Citizen”.
Job Summary
A student assistant will carry out administrative and technical tasks requested by a supervisor. Depending on the area the student assistant is employed in, they may assist and mentor other students or provide support throughout the campus in various forms.
Job Duties
Support Red Team operations through controlled security testing and research activities.
Assist in developing, modifying, and maintaining internal security tools and automation.
Research and evaluate adversary techniques, tradecraft, and mitigation strategies.
Collaborate with cross‑functional teams to plan, execute, and document security assessments.
Produce clear technical documentation and communicate findings to internal stakeholders.
Adhere to strict confidentiality, ethical guidelines, and operational security requirements.
Required Education
High school diploma or equivalent
Additional Requirements
Engaged in completing a four-year or graduate level degree in Computer Science, Computer Engineering, or CyberSecurity at Wichita State University.
Experience with Python, C++, or C#
Interested in Red Team work.
Basic understanding of shellcode injection techniques.
Ability to work independently and in a team setting.
Strong communication and organizational skills.
Preferred Qualifications
Exposure to full-stack development.
Familiarity with automation and API integration.
Strong understanding of shellcode injection techniques.
Familiarity with networking, especially in a Windows environment.
Strong Windows administration skills.
Exposure to Azure Tenants, Defender with M365, Windows EDR.
Exposure to one or more of the common command and control (C2) frameworks: Havoc, Metasploit, Sliver, Cobalt Strike.
Exposure to evasion tactics such as sleep, obfuscate, patch AMSI/ETW, sign, self-delete.
Physical Requirements
Ability to remain in a stationary position.
Ability to operate a computer and other office equipment including but not limited to phone, printers, copiers, and calculators.
Ability to communicate with others and accurately exchange information.
We use "cookies" on this site. A cookie is a piece of data stored on a site visitor's hard drive to help us improve your access to our site and identify repeat visitors to our site. For instance, when we use a cookie to identify you, you would not have to log in a password more than once, thereby saving time while on our site. Cookies can also enable us to track and target the interests of our users to enhance the experience on our site. Usage of a cookie is in no way linked to any personally identifiable information on our site.
Some of our business partners may use cookies on our site (for example, Google Analytics). However, we have no access to or control over these cookies.