
Senior Cyber Security Engineer / CSET Team
Scientific Research Corporation
- Patuxent River, MD
- Permanent
- Full-time
- Performing as a member of CSET Team providing guidance and subject matter expertise to government personnel
- Supporting offensive security/red team/adversarial emulation testing
- Executing Red Team engagements in a variety of networks using real-world adversarial Tactics, Techniques, and Procedures (TTPs) from conception to report delivery
- Developing comprehensive security testing strategies and programs to provide assurance that security controls are designed and operating effectively
- Developing innovative accelerators, tools, mechanisms, and processes to enhance the security team's velocity and scale to customer needs
- Facilitating multiple stakeholders to agree on appropriate solutions and verifying that risks are mitigated appropriately
- Working independently but collaborate with cross-functional to provide security engineering consulting and control design recommendations to reduce risk
- Conducting open-source intelligence gathering, network vulnerability scanning, exploitation of vulnerable services, lateral movement, install persistence in a target network(s), and manage C2 infrastructure
- Systematically analyzing each component of an application with the intent of locating programming flaws that could be leveraged to compromise the software through source code review or reverse engineering
- Developing payloads, scripts and tools that weaponize new proof-of-concepts for exploitation, evasion, and lateral movement
- Safely utilize attacker tools, tactics, and procedures when in sensitive environments/devices
- Evading EDR devices such as Windows Defender and Carbon Black to avoid detection by Defenders/behavioral based alerting in order to further the engagement objectives
- Demonstrating expertise in one of the following: Active Directory, Software Development, Incident Response, or Cloud Infrastructure
- Carefully document and log all exploitation activities
- Continually exercise situational awareness in order to quickly identify any instances of cohabitation
- Documenting identified vulnerabilities and researching corrective/remediation actions in order to recommend a risk mitigation technique(s)
- Demonstrating new vulnerabilities and assist Network Defenders (Blue Team) with the refinement of detection capabilities
- Maintaining knowledge of applicable Red Team policies, Standing Ground Rules, regulations, and compliance documents
- Communicating effectively with team members especially during an engagement
- Ability to think unconventionally in order to develop adversarial TTPs
- Keeping current with TTPs and the latest offensive security techniques
- Bachelor’s degree with a focus in computer science, computer information systems, engineering, mathematics, management information systems, cybersecurity, cyber operations, or a related discipline with corresponding experience and demonstrated mastery of relevant computer science topics
- 5+ years of cyber adversarial emulation experience, to include penetration testing of modern Windows and Linux operating systems, IP-based networks and protocols, 802.11 networks, and/or web applications, hardware hacking, software defined networks/RF
- 10+ years of experience in leading complex and technically diverse teams of cyber professionals (software developers, system administrators, penetration testers, incident responders, etc.)
- Intermediate knowledge of known Advanced Persistent Threat (APT) actor Techniques, Tactics, and Procedures (TTPs), to include familiarity with terminology from Mitre ATT&CK® used to describe TTPs used in cyber attacks
- Intermediate knowledge of techniques and tools used for exploit development of common operating systems, software debugging, and application fuzzing
- Intermediate knowledge of tools and techniques used for incident response, reverse engineering, and digital forensics
- Superior oral communication skills, including the ability to project confidence and enthusiasm, in the following core areas: formal presentations; soliciting goals and requirements from range users; explaining adversarial emulation in the context of testing and training events; effectively communicating event and environment requirements to CSET members; explaining cost estimates based on estimated levels of CSET effort; managing expectations as relevant to CSET TTPs; and explaining technical nuances and significant attributes of advanced cyber attacks to non-cyber-savvy audiences
- Superior technical writing skills, including the ability to author, review, and provide input and feedback to documents drafted by CSET personnel, as well as the ability to create persuasive and impactful technical briefing materials as relevant to range training and test events
- Ability to work independently and to collaborate with range and event leadership, CSET team members, users, and other event stakeholders
- Required/Maintain IAT Level III or IAM Level III 8570 certifications include one or more of the following:
- CASP+ CE
- CCNP Security
- CISA
- GIAC® Incident Handler (GCIH)
- GIAC® Certified Enterprise Defender (GCED)
- CISM
- GSLC
- CCISO
- Certified Information Systems Security Professional (CISSP)
- In addition to meeting the applicable cyber security workforce (CSWF) requirements for Computer Network Defenders (CND) Auditors (DoD 8570) or Vulnerability Assessment Analysts (SECNAV 5239.2), CSET members must obtain one or more of the following vendor certifications within 6 months of being hired:
- Offensive Security Certified Engineer (OSCE)
- Offensive Security Certified Professional (OSCP)
- GIAC Certified Exploit Researcher and Advanced Penetration Testers (GXPN)
- Offensive Security Certified Engineer (OSCE3)
- Master’s degree with a focus in computer science or cybersecurity
- 10+ years of experience supporting the execution of Department of Defense (DoD) offensive cyber operations (OCO) or defensive cyber operations (DCO) as a civilian, contractor, or uniformed personnel
- Experience with operational training programs and qualification standards
- Red Team, Computer Operator or Exploitation Analyst experience with Threat Systems Management Office (TSMO), US Air Force, US Navy or National Security Agency (NSA) / Cyber Mission Force teams
- Experience with OT, IoT, XIoT is a plus