Scientific Research Corporation · 3 hours ago
Senior Cyber Security Engineer / CSET Team
Scientific Research Corporation is an advanced information technology and engineering company that provides innovative products and services to government and private industry. They are seeking a Senior Cyber Security Engineer to provide guidance and subject matter expertise to government personnel, support offensive security testing, and develop comprehensive security testing strategies.
Biotechnology
Responsibilities
Performing as a member of CSET Team providing guidance and subject matter expertise to government personnel
Supporting offensive security/red team/adversarial emulation testing
Executing Red Team engagements in a variety of networks using real-world adversarial Tactics, Techniques, and Procedures (TTPs) from conception to report delivery
Developing comprehensive security testing strategies and programs to provide assurance that security controls are designed and operating effectively
Developing innovative accelerators, tools, mechanisms, and processes to enhance the security team's velocity and scale to customer needs
Facilitating multiple stakeholders to agree on appropriate solutions and verifying that risks are mitigated appropriately
Working independently but collaborate with cross-functional to provide security engineering consulting and control design recommendations to reduce risk
Conducting open-source intelligence gathering, network vulnerability scanning, exploitation of vulnerable services, lateral movement, install persistence in a target network(s), and manage C2 infrastructure
Systematically analyzing each component of an application with the intent of locating programming flaws that could be leveraged to compromise the software through source code review or reverse engineering
Developing payloads, scripts and tools that weaponize new proof-of-concepts for exploitation, evasion, and lateral movement
Safely utilize attacker tools, tactics, and procedures when in sensitive environments/devices
Evading EDR devices such as Windows Defender and Carbon Black to avoid detection by Defenders/behavioral based alerting in order to further the engagement objectives
Demonstrating expertise in one of the following: Active Directory, Software Development, Incident Response, or Cloud Infrastructure
Carefully document and log all exploitation activities
Continually exercise situational awareness in order to quickly identify any instances of cohabitation
Documenting identified vulnerabilities and researching corrective/remediation actions in order to recommend a risk mitigation technique(s)
Demonstrating new vulnerabilities and assist Network Defenders (Blue Team) with the refinement of detection capabilities
Maintaining knowledge of applicable Red Team policies, Standing Ground Rules, regulations, and compliance documents
Communicating effectively with team members especially during an engagement
Ability to think unconventionally in order to develop adversarial TTPs
Keeping current with TTPs and the latest offensive security techniques
Qualification
Required
Bachelor's degree with a focus in computer science, computer information systems, engineering, mathematics, management information systems, cybersecurity, cyber operations, or a related discipline with corresponding experience and demonstrated mastery of relevant computer science topics
5+ years of cyber adversarial emulation experience, to include penetration testing of modern Windows and Linux operating systems, IP-based networks and protocols, 802.11 networks, and/or web applications, hardware hacking, software defined networks/RF
10+ years of experience in leading complex and technically diverse teams of cyber professionals (software developers, system administrators, penetration testers, incident responders, etc.)
Intermediate knowledge of known Advanced Persistent Threat (APT) actor Techniques, Tactics, and Procedures (TTPs), to include familiarity with terminology from Mitre ATT&CK® used to describe TTPs used in cyber attacks
Intermediate knowledge of techniques and tools used for exploit development of common operating systems, software debugging, and application fuzzing
Intermediate knowledge of tools and techniques used for incident response, reverse engineering, and digital forensics
Superior oral communication skills, including the ability to project confidence and enthusiasm, in the following core areas: formal presentations; soliciting goals and requirements from range users; explaining adversarial emulation in the context of testing and training events; effectively communicating event and environment requirements to CSET members; explaining cost estimates based on estimated levels of CSET effort; managing expectations as relevant to CSET TTPs; and explaining technical nuances and significant attributes of advanced cyber attacks to non-cyber-savvy audiences
Superior technical writing skills, including the ability to author, review, and provide input and feedback to documents drafted by CSET personnel, as well as the ability to create persuasive and impactful technical briefing materials as relevant to range training and test events
Ability to work independently and to collaborate with range and event leadership, CSET team members, users, and other event stakeholders
Required/Maintain IAT Level III or IAM Level III 8570 certifications include one or more of the following: CASP+ CE, CCNP Security, CISA, GIAC® Incident Handler (GCIH), GIAC® Certified Enterprise Defender (GCED), CISM, GSLC, CCISO, Certified Information Systems Security Professional (CISSP)
In addition to meeting the applicable cyber security workforce (CSWF) requirements for Computer Network Defenders (CND) Auditors (DoD 8570) or Vulnerability Assessment Analysts (SECNAV 5239.2), CSET members must obtain one or more of the following vendor certifications within 6 months of being hired: Offensive Security Certified Engineer (OSCE), Offensive Security Certified Professional (OSCP), GIAC Certified Exploit Researcher and Advanced Penetration Testers (GXPN), Offensive Security Certified Engineer (OSCE3)
Preferred
Master's degree with a focus in computer science or cybersecurity
10+ years of experience supporting the execution of Department of Defense (DoD) offensive cyber operations (OCO) or defensive cyber operations (DCO) as a civilian, contractor, or uniformed personnel
Red Team, Computer Operator or Exploitation Analyst experience with Threat Systems Management Office (TSMO), US Air Force, US Navy or National Security Agency (NSA) / Cyber Mission Force teams
Experience with OT, IoT, XIoT is a plus
Benefits
Medical, dental, and vision plans
401(k) with a company match
Life insurance
Vacation and sick paid time off accruals starting at 10 days of vacation and 5 days of sick leave annually
11 paid holidays
Tuition reimbursement
A work environment that encourages excellence
Company
Scientific Research Corporation
Scientific Research Corporation provides innovative solutions to the U.S. government, private industry, and international markets.