Tech Stack
Cyber SecurityPythonTypeScript
About the role
- Supports federal government "purple team" ops providing Computer Network Defense, Offense, Incident Response, and Threat Emulation
- Assist cybersecurity operations to identify risks and exposures using advanced security/pen testing and auditing
- Perform real-world threat activity simulation attacks to train and measure defenses
- Analyze systems for weaknesses, devise tests and scenarios, document results, and recommend improvements
- Develop automated testing and customized Python and PowerShell scripts, payloads, and backdoor emulations
- Map Cyber Key Terrain, generate priority target lists, and research emerging threats and tools
- Utilize ODNI Cyber Threat Framework and produce Threat Emulation findings in that format
- Report and brief threat emulation operations and provide capability enhancement recommendations
Requirements
- One or more certifications: GCIA, GCED, GCFE, GCTI, GNFA, GCIH, CND, ECSA, OSCP, OSEE, OSCE, GCFA, GREM, CHFI
- Offensive Security Certified Professional - OSCP (optional but preferred), Certified Ethical Hacker - CEH (optional)
- Typically has a bachelor degree, and 4-5 years of experience, or equivalent relevant work experience
- Threat Emulation SMEs must have at least 4-5 years of experience in incident detection, cyber defense, cyber intelligence analysis, and/or Penetration Testing
- Bachelor’s Degree in Information Technology, Cyber Security, Computer Science, Computer Engineering, Electrical Engineering, or related field of study
- Active Top Secret Clearance and SCI Eligibility
- Strong analytical and technical skills in computer network defense operations
- Prior experience and ability with analyzing threat intelligence/information or providing cyber defense analytical capabilities to assist in proactive identification of threats, events, and incidents
- Ability to develop rules, filters, views, signatures, countermeasures and operationally relevant applications and scripts to support efforts
- Strong logical/critical thinking abilities, especially analyzing vulnerability information and current adversarial TTPs and IOCs
- Strong proficiency Report writing – a technical writing sample and technical editing test will be required if the candidate has no prior published intelligence analysis reporting
- Excellent organizational and attention to detail in tracking activities as part of overall Security Operation workflows or projects
- Experience with the identification and implementation of defensive countermeasures or mitigating controls for deployment and implementation in the enterprise network environment
- Experience in mentoring and training analysts or Red Team members
- Knowledge of different operational threat environments and general attack stages
- Knowledge of incident categories, incident responses, and timelines for responses