drjobs Senior Cyber Security Engineer CSET Lead

Senior Cyber Security Engineer CSET Lead

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Orlando, FL - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Description

  • Overseeing CSET Team operators and providing guidance and subject matter expertise to government personnel
  • Supporting offensive security/red team/adversarial emulation testing
  • Executing Red Team engagements in a variety of networks using realworld adversarial Tactics Techniques and Procedures (TTPs) from conception to report delivery
  • Developing comprehensive security testing strategies and programs across NCRCU to provide assurance that security controls are designed and operating effectively
  • Developing innovative accelerators tools mechanisms and processes to enhance the security teams velocity and scale to customer needs
  • Facilitating multiple stakeholders to agree on appropriate solutions and verifying that risks are mitigated appropriately
  • Demonstrating creativity insight intellectual flexibility and sound business judgment throughout the process
  • Working independently but collaborate with crossfunctional to provide security engineering consulting and control design recommendations to reduce risk
  • Conducting opensource intelligence gathering network vulnerability scanning exploitation of vulnerable services lateral movement install persistence in a target network(s) and manage C2 infrastructure
  • Systematically analyzing each component of an application with the intent of locating programming flaws that could be leveraged to compromise the software through source code review or reverse engineering
  • Developing payloads scripts and tools that weaponize new proofofconcepts for exploitation evasion and lateral movement
  • Safely utilize attacker tools tactics and procedures when in sensitive environments/devices
  • Evading EDR devices such as Windows Defender and Carbon Black to avoid detection by Defenders/behavioral based alerting in order to further the engagement objectives
  • Demonstrating expertise in one of the following: Active Directory Software Development Incident Response or Cloud Infrastructure
  • Carefully document and log all exploitation activities
  • Continually exercise situational awareness in order quickly identify any instances of cohabitation
  • Documenting identified vulnerabilities and researching corrective/remediation actions in order to recommend a risk mitigation technique(s)
  • Demonstrating new vulnerabilities and assist Network Defenders (Blue Team) with the refinement of detection capabilities
  • Maintaining knowledge of applicable Red Team policies Standing Ground Rules regulations and compliance documents
  • Communicating effectively with team members and during an engagement
  • Ability to think unconventionally in order to develop adversarial TTPs
  • Keeping current with TTPs and the latest offensive security techniques

#LIDG1

Requirements

  • Bachelors degree with a focus in computer science computer information systems engineering mathematics management information systems cybersecurity cyber operations or a related discipline with corresponding experience and demonstrated mastery of relevant computer science topics
  • 5 years of cyber adversarial emulation experience to include penetration testing of modern Windows and Linux operating systems IPbased networks and protocols 802.11 networks and/or web applications hardware hacking software defined networks/RF
  • 10 years of experience in leading complex and technically diverse teams of cyber professionals (software developers system administrators penetration testers incident responders etc.
  • Intermediate knowledge of known Advanced Persistent Threat (APT) actor Techniques Tactics and Procedures (TTPs) to include familiarity with terminology from Mitre ATT&CK used to describe TTPs used in cyber attacks
  • Intermediate knowledge of techniques and tools used for exploit development of common operating systems software debugging and application fuzzing
  • Intermediate knowledge of tools and techniques used for incident response reverse engineering and digital forensics
  • Superior oral communication skills including the ability to project confidence and enthusiasm in the following core areas: formal presentations; soliciting goals and requirements from range users; explaining adversarial emulation in the context of testing and training events; effectively communicating event and environment requirements to CSET members; explaining cost estimates based on estimated levels of CSET effort; managing expectations as relevant to CSET TTPs; and explaining technical nuances and significant attributes of advanced cyber attacks to noncybersavvy audiences
  • Superior technical writing skills including the ability to author review and provide input and feedback to documents drafted by CSET personnel as well as the ability to create persuasive and impactful technical briefing materials as relevant to range training and test events
  • Ability to work independently and to collaborate with range and event leadership CSET team members users and other event stakeholders
  • Required/Maintain IAT Level III or IAM Level III 8570 certifications include one or more of the following:
    • CASP CE
    • CCNP Security
    • CISA
    • GIAC Incident Handler (GCIH)
    • GIAC Certified Enterprise Defender (GCED)
    • CISM
    • GSLC
    • CCISO
    • Certified Information Systems Security Professional (CISSP)
  • In addition to meeting the applicable cyber security workforce (CSWF) requirements for Computer Network Defenders (CND) Auditors (DoD 8570 or Vulnerability Assessment Analysts (SECNAV 5239.2 CSET members must obtain one or more of the following vendor certifications within 6 months of being hired:
    • Offensive Security Certified Engineer (OSCE)
    • Offensive Security Certified Professional (OSCP)
    • GIAC Certified Exploit Researcher and Advanced Penetration Testers (GXPN)
    • Offensive Security Certified Engineer (OSCE3

Desired Skills

  • Masters degree with a focus in computer science or cybersecurity
  • 10 years of experience supporting the of Department of Defense (DoD) offensive cyber operations (OCO) or defensive cyber operations (DCO) as a civilian contractor or uniformed personnel
  • Experience with operational training programs and qualification standards
  • Red Team Computer Operator or Exploitation Analyst experience with Threat Systems Management Office (TSMO) US Air Force US Navy or National Security Agency (NSA) / Cyber Mission Force teams
  • Experience with OT IoT XIoT is a plus

Clearance Information

SRC IS A CONTRACTOR FOR THE U.S. GOVERNMENT THIS POSITION WILL REQUIRE U.S. CITIZENSHIP AS WELL AS A U.S. GOVERNMENT SECURITY CLEARANCE AT THE TOP SECRET / SCI LEVEL

Travel Requirements

n/a

About Us

Scientific Research Corporation is an advanced information technology and engineering company that provides innovative products and services to government and private industry as well as independent institutions. At the core of our capabilities is a seasoned team of highly skilled engineers and scientists with multidisciplinary backgrounds. This team is challenged daily to provide cutting edge technology solutions to our clients.

SRC offers a generous benefit package including medical dental and vision plans 401(k) with a company match life insurance vacation and sick paid time off accruals starting at 10 days of vacation and 5 days of sick leave annually 11 paid holidays tuition reimbursement and a work environment that encourages excellence and more. For positions requiring a security clearance selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information.

Diversity & Inclusion

We strongly believe in the abundance of differences among individuals. We value different points of view and appreciate diverse perspectives. We truly believe this is what makes our organization inclusive and more responsive to the needs of our diverse customers.

EEO

Scientific Research Corporation is an equal opportunity and affirmative action employer that does not discriminate in employment. All qualified applicants will receive consideration for employment without regard to their race color religion sex age sexual orientation gender identity or national origin disability or protected veteran status.

Scientific Research Corporation endeavors to make www.scires accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process please contact for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.


Required Experience:

Senior IC

Employment Type

Full-Time

Company Industry

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.