Description
Qualifications
Required Qualifications:
- Bachelor's degree required system administrator experience including experience within a Linux environment
- 14 years experience as a DoD/IC Cyber Operator with DoD Tool Champion or TTP evaluation and Operational Planning Experience
- Certification from Offensive Security; (Certified Professional (OSCP), Certified Expert (OSCE), Web Expert (OSWE), or Exploitation Expert (OSEE)
- Knowledge of how OCO capabilities can be used to augment other Air/Space/Ground domain activities
- Demonstrated programming (C, C++, C#, Perl, Java, etc.) or scripting (Python, Shell, Powershell) skills and ability to conduct code review of the same
- Familiarity with current USCYBERCOM Mission Managment processes
- Familiarity with open-source penetration testing suites (Kali Linux BlackBox, or similar)
- TS/SCI Eligibility with active Counterintelligence or Full Scope Polygraph
Responsibilities
In-depth demonstrated experience commensurate with the designated level in the following areas:
Responsible for assisting in documenting and refinement of CONOPs by considering capabilities and tools delivered to Combat Mission Teams assigned to Joint Force Headquarters (JFHQ-C) and identify potential deficiencies or Operations Security (OPSEC) concerns for review. You will utilize current CMT Tactics, Techniques and Procedures (TTPs) or propose modifications or new TTPs for adoption, to ensure access vectors are able to be utilized. Work with units to understand and recommend possible OCAs for operations, capturing the expected outcomes, limitations, and extent of those operations. Use and assist in the design of cyber target representative networks to effectively assess the functionality of tools and kill chains in development.
Apply on company website