drjobs OPFOR Cyber Subject Matter Expert (SME), NATO-JWC

OPFOR Cyber Subject Matter Expert (SME), NATO-JWC

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Bydgoszcz - Poland

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Description

Summary:
Yorktown Systems Group is seeking a qualified OPFOR Cyber Subject Matter Expert (SME) to support NATOs Joint Warfare Centers (JWC) high priority exercises. JWCs mission is to deliver high value exercises to NATO Command Structure and Force Structure entities and organizations in accordance with direction and guidance received from Allied Command Transformation (ACT) as well as SACEURs Annual Guidance for Exercise (SAGE) and the Military Training Evaluation Plan (MTEP). JWC employs a matrixmanagement organizational structure with staff Directorates and Divisions comprising the vertical component and multiyear Exercise programs led by Program Directors providing the lateral component. By managing the multiyear Exercise programs the Program Directors coordinate JWCs contribution and support to NATOs exercise and training program. the provider will be required to develop produce deliver and archive new settings and scenarios and update / review and deliver existing settings and scenarios to include necessary consultation that complement and support the work carried out by JWCs Scenario Branch. The ambition is to leverage professional forwardthinking Provider(s) with the ability to bring creativity novel design thinking and industry best practices to JWCs business functions of designing developing and delivering exercise settings and scenarios as well as directly supporting the delivery of NATOs Major Joint Exercise Program.

Specific duties may include but are not limited to:

  • Take part in/contribute to OPFOR CYBER incident and storyline development of OPFOR CYBER effects in the Joint Exercise Management Module (JEMM) and develop OPFOR CYBER effects at appropriate level and in accordance with and the overall OPFOR Joint Plan (OJP) and Scheme of Manoeuvre (SoM).
  • Ensure that all OPFOR CYBER incidents and injects in JEMM are focused on strategic and operational level effects (not tactical).
  • Support MEL/MIL Scripting including JEMM translating guidance from OPFOR command cell and OPFOR J35 into a deliverable plan and overseeing OPFOR CYBER operations across all Events Incidents and Injects.
  • Actively support and advise assigned MEL/MIL workshop syndicate(s) on OPFOR CYBER implications related to incidents and injects and develop opportunities for OPFOR CYBER effects by contributing OPFOR CYBER expertise.
  • Specifically ensure wider understanding of OPFOR CYBER implications within events incidents storylines and themes and identify opportunities for OPFOR CYBER effects to be further developed and explored ICCW other Response Cells.
  • Coordinate synchronize and deconflict OPFOR CYBER injects in JEMM across the overall exercise battle rhythm with other OPFOR cells and other EXCON cells as required.
  • Specifically coordinate with EXCON CYBER Response Cell (RC) as required.
  • Contribute to the OPFOR Operational Design from a CYBER domain perspective.
  • Advise OPFOR command cell and OPFOR J35 in cyber warfare.
  • Brief the OPFOR CYBER team on the cyberspace package (i.e. Cyber threat actors their TTPs etc.) as required.
  • Attend boards working groups syndicates and other meetings as directed by OPFOR command cell and OPFOR J35.
  • Be prepared to attend OPFOR Crisis Action Team (CAT) activation at short notice or no notice in order support resolution of a critical exercise related issue.
  • Coordinate CAX (Computer Assisted Exercise) and Joint Theatre Level Simulation (JTLS) requirements for OPFOR CYBER actions.
  • Perform other OPFOR CYBER tasks as directed by the OPFOR command cell OPFOR J35.
  • Collaborate daily with OPFOR command cell and OPFOR J35 to ensure timely alignment with the latest OPFOR developments as directed by the OPFOR command cell and OPFOR J35.
  • Assist with the preparation of OPFOR FRAGOs.
  • Provide daily OPFOR CYBER feedback and updates to the OPFOR command cell and OPFOR J35 as required. BPT brief specific OPFOR CYBER issues at the daily OPFOR Huddle
  • Provide support to EXCON Targeting (TGTs) cell for Battle Damage Assessment (BDA) reporting.
  • Be prepared to dynamically script in JEMM OPFOR CYBER content as required by the MEL/MIL TA activity OPFOR command cell and OPFOR J35 D&G.


Requirements

Required Qualifications:

  • Higherlevel Civilian Military or Staff College Education/Degree or advanced military course relevant to cybersecurity computer science or a similar discipline.
  • Minimum 4 years previous military experience within the last 12 years in the operational CYBER domain reaching the rank of OF3/OF4 (suitably experienced OF2/OR7 considered by exception based on expertise and relevant staff experience).
  • Indepth knowledge and understanding of NATOs CYBERSPACE operations Operational Planning Procedures and Processes
  • Experience of NATO or National Operational Exercises.
  • Current NATO Secret Security Clearance or National equivalent.
  • Demonstrated proficiency in English as defined in STANAG 6001 (Standardized Linguistic Profile (SLP) 3333 Listening Speaking Reading and Writing) or equivalent.

Clearance:Must possess an active NATO or U.S. SECRET or higher security clearance.

Location:NATO Joint Warfare Center Stavanger Norway

Travel: CONUS and OCONUS travel may be required.



Employment Type

Part-Time

Company Industry

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.