We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results

Senior Cyber Security Engineer / CSET Lead

Scientific Research Corporation
life insurance, paid time off, paid holidays, sick time, tuition reimbursement, 401(k)
United States, Florida, Orlando
Nov 04, 2024

Senior Cyber Security Engineer / CSET Lead
Location

US-FL-Orlando
ID

2024-8897


Category
Cyber Security

Position Type
Regular Full-Time



About Us

Scientific Research Corporation is an advanced information technology and engineering company that provides innovative products and services to government and private industry, as well as independent institutions. At the core of our capabilities is a seasoned team of highly skilled engineers and scientists with multidisciplinary backgrounds. This team is challenged daily to provide cutting edge technology solutions to our clients.

SRC offers a generous benefit package, including medical, dental, and vision plans, 401(k) with a company match, life insurance, vacation and sick paid time off accruals starting at 10 days of vacation and 5 days of sick leave annually, 11 paid holidays, tuition reimbursement, and a work environment that encourages excellence and more. For positions requiring a security clearance, selected applicants will be subject to a government security investigation and must meet eligibility requirements for access to classified information.



Requirements

    Bachelor's degree with a focus in computer science, computer information systems, engineering, mathematics, management information systems, cybersecurity, cyber operations, or a related discipline with corresponding experience and demonstrated mastery of relevant computer science topics
  • 5+ years of cyber adversarial emulation experience, to include penetration testing of modern Windows and Linux operating systems, IP-based networks and protocols, 802.11 networks, and/or web applications, hardware hacking, software defined networks/RF
  • 10+ years of experience in leading complex and technically diverse teams of cyber professionals (software developers, system administrators, penetration testers, incident responders, etc.)
  • Intermediate knowledge of known Advanced Persistent Threat (APT) actor Techniques, Tactics, and Procedures (TTPs), to include familiarity with terminology from Mitre ATT&CK used to describe TTPs used in cyber attacks
  • Intermediate knowledge of techniques and tools used for exploit development of common operating systems, software debugging, and application fuzzing
  • Intermediate knowledge of tools and techniques used for incident response, reverse engineering, and digital forensics
  • Superior oral communication skills, including the ability to project confidence and enthusiasm, in the following core areas: formal presentations; soliciting goals and requirements from range users; explaining adversarial emulation in the context of testing and training events; effectively communicating event and environment requirements to CSET members; explaining cost estimates based on estimated levels of CSET effort; managing expectations as relevant to CSET TTPs; and explaining technical nuances and significant attributes of advanced cyber attacks to non-cyber-savvy audiences
  • Superior technical writing skills, including the ability to author, review, and provide input and feedback to documents drafted by CSET personnel, as well as the ability to create persuasive and impactful technical briefing materials as relevant to range training and test events
  • Ability to work independently and to collaborate with range and event leadership, CSET team members, users, and other event stakeholders
  • Required/Maintain IAT Level III or IAM Level III 8570 certifications include one or more of the following:
    • CASP+ CE
    • CCNP Security
    • CISA
    • GIAC Incident Handler (GCIH)
    • GIAC Certified Enterprise Defender (GCED)
    • CISM
    • GSLC
    • CCISO
    • Certified Information Systems Security Professional (CISSP)
  • In addition to meeting the applicable cyber security workforce (CSWF) requirements for Computer Network Defenders (CND) Auditors (DoD 8570) or Vulnerability Assessment Analysts (SECNAV 5239.2), CSET members must obtain one or more of the following vendor certifications within 6 months of being hired:
    • Offensive Security Certified Engineer (OSCE)
    • Offensive Security Certified Professional (OSCP)
    • GIAC Certified Exploit Researcher and Advanced Penetration Testers (GXPN)
    • Offensive Security Certified Engineer (OSCE3)


Desired Skills

  • Master's degree with a focus in computer science or cybersecurity
  • 10+ years of experience supporting the execution of Department of Defense (DoD) offensive cyber operations (OCO) or defensive cyber operations (DCO) as a civilian, contractor, or uniformed personnel
  • Experience with operational training programs and qualification standards
  • Red Team, Computer Operator or Exploitation Analyst experience with Transportation Systems Management and Operations (TSMO), US Air Force, US Navy or National Security Agency (NSA) / Cyber Mission Force teams
  • Experience with OT, IoT, XIoT is a plus


Description

  • Oversee CSET Team operators and provide guidance and subject matter expertise to government personnel
  • Support offensive security/red team/adversarial emulation testing
  • Execute Red Team engagements in a variety of networks using real-world adversarial Tactics, Techniques, and Procedures (TTPs) from conception to report delivery
  • Develop comprehensive security testing strategies and programs across NCRC-U to provide assurance that security controls are designed and operating effectively
  • Develop innovative accelerators, tools, mechanisms, and processes to enhance the security team's velocity and scale to customer needs
  • Facilitate multiple stakeholders to agree on appropriate solutions and verify that risks are mitigated appropriately. Demonstrate creativity, insight, intellectual flexibility, and sound business judgment throughout the process
  • Work independently but collaborate with cross-functional to provide security engineering consulting and control design recommendations to reduce risk
  • Conduct open-source intelligence gathering, network vulnerability scanning, exploitation of vulnerable services, lateral movement, install persistence in a target network(s), and manage C2 infrastructure
  • Systematically analyze each component of an application with the intent of locating programming flaws that could be leveraged to compromise the software through source code review or reverse engineering
  • Develop payloads, scripts and tools that weaponize new proof-of-concepts for exploitation, evasion, and lateral movement
  • Safely utilize attacker tools, tactics, and procedures when in sensitive environments/devices
  • Evade EDR devices such as Windows Defender and Carbon Black to avoid detection by Defenders/behavioral based alerting in order to further the engagement objectives
  • Demonstrate expertise in one of the following: Active Directory, Software Development, Incident Response, or Cloud Infrastructure
  • Carefully document and log all exploitation activities
  • Continually exercise situational awareness in order quickly identify any instances of cohabitation
  • Document identified vulnerabilities and research corrective/remediation actions in order to recommend a risk mitigation technique(s)
  • Demonstrate new vulnerabilities and assist Network Defenders (Blue Team) with the refinement of detection capabilities
  • Maintain knowledge of applicable Red Team policies, Standing Ground Rules, regulations, and compliance documents
  • Communicate effectively with team members and during an engagement
  • Ability to think unconventionally in order to develop adversarial TTPs
  • Keep current with TTPs and the latest offensive security techniques

[#LI-DG1]



Clearance Information

SRC IS A CONTRACTOR FOR THE U.S. GOVERNMENT, THIS POSITION WILL REQUIRE U.S. CITIZENSHIP AS WELL AS, A U.S. GOVERNMENT SECURITY CLEARANCE AT THE TOP SECRET / SCI LEVEL



Diversity & Inclusion

We strongly believe in the abundance of differences among individuals. We value different points of view and appreciate diverse perspectives. We truly believe this is what makes our organization inclusive and more responsive to the needs of our diverse customers.



EEO

Scientific Research Corporation is an equal opportunity and affirmative action employer that does not discriminate in employment.

All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, or national origin, disability or protected veteran status.

Scientific Research Corporation endeavors to make www.scires.com accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact jobs@scires.com for assistance. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.

Applied = 0

(web-5584d87848-7ccxh)