Cyber Network Operations (CNO) Advisor jobs in United States
cer-icon
Apply on Employer Site
company-logo

Veros Technologies, LLC · 1 day ago

Cyber Network Operations (CNO) Advisor

Veros Technologies, LLC is dedicated to solving clients’ toughest technical challenges while making a lasting impact in communities. As a Cyber Network Operations (CNO) Advisor, you will support the management and fulfillment of the customer’s long-term TDY cyber mission requirements.

Cyber SecurityNetwork SecuritySoftwareTechnical Support
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Clearance: • Active TS/SCI with Poly
Citizenship: • U.S. Citizenship
Travel: • Ability to support 30-90 day OCONUS rotational deployments (candidates are not required to live in the Northern Virginia / Washington Metro Area and are able to take time off in between deployments)
Experience: Minimum of 10 years of relevant work experience in areas such as: offensive computer operations, computer network operations, computer network defense, or computer network exploitation
Understanding of client relationships, including determining needs, learning expectations, and demonstrating commitment to delivering quality results
Understanding of all phases of adversary emulation operations including passive and active reconnaissance, social engineering, exploitation, post-exploitation, covert techniques, lateral movement, data exfiltration, and data exploitation
Experience with vulnerability enumeration and exploitation frameworks, including NMAP, Kali, Burp Suite Pro, Metasploit, Cobalt Strike, Armitage, and PowerSploit
Knowledgeable in offensive cybersecurity roles, such as malware development, reverse engineering, red teaming, penetration testing (e.g., web, infrastructure, cloud), purple team exercises in cloud and on-prem environments
Technical proficiency in several of the following areas:
+ Operating systems fundamentals (Windows and/or Unix/Linux)
+ System administration (Windows and/or Unix/Linux)
+ Network security, administration, traffic analysis
+ Penetration testing/Red Team/Blue Team
+ Incident response and Computer forensics
+ Vulnerability and malware analysis
+ Scripting and/or programming
Desired Experience performing similar roles within the Federal Intelligence Community
Proficiency scripting/programming in various languages such as Python, Bash, Java, PowerShell, or C# with the ability to create and customize tools and craft custom exploits for proof-of-concept code
Desired Professional Certifications: Offensive Security Certifications (OSCP, OSCE, OSWP, OSWE, OSEE), SANS GIAC Certifications (GPEN, GWAP, GPYC, GXPN, GSE), Certified Ethical Hacker (CEH)
Experience with collection management processes, capabilities, technical targeting, and reporting

Qualification

Active TS/SCI with PolyOffensive computer operationsVulnerability enumeration frameworksOffensive cybersecurity rolesScripting/programming proficiencyIncident responsePenetration testingTechnical targetingClient relationship managementData exfiltrationSocial engineeringData exploitationMalware developmentReverse engineeringPurple team exercisesComputer forensicsNetwork securitySystem administrationOperating systems fundamentalsTraffic analysisVulnerability analysis

Required

Active TS/SCI with Poly
U.S. Citizenship
Ability to support 30-90 day OCONUS rotational deployments (candidates are not required to live in the Northern Virginia / Washington Metro Area and are able to take time off in between deployments)
Minimum of 10 years of relevant work experience in areas such as: offensive computer operations, computer network operations, computer network defense, or computer network exploitation
Understanding of client relationships, including determining needs, learning expectations, and demonstrating commitment to delivering quality results
Understanding of all phases of adversary emulation operations including passive and active reconnaissance, social engineering, exploitation, post-exploitation, covert techniques, lateral movement, data exfiltration, and data exploitation
Experience with vulnerability enumeration and exploitation frameworks, including NMAP, Kali, Burp Suite Pro, Metasploit, Cobalt Strike, Armitage, and PowerSploit
Knowledgeable in offensive cybersecurity roles, such as malware development, reverse engineering, red teaming, penetration testing (e.g., web, infrastructure, cloud), purple team exercises in cloud and on-prem environments
Technical proficiency in several of the following areas: Operating systems fundamentals (Windows and/or Unix/Linux), System administration (Windows and/or Unix/Linux), Network security, administration, traffic analysis, Penetration testing/Red Team/Blue Team, Incident response and Computer forensics, Vulnerability and malware analysis, Scripting and/or programming

Preferred

Experience performing similar roles within the Federal Intelligence Community
Proficiency scripting/programming in various languages such as Python, Bash, Java, PowerShell, or C# with the ability to create and customize tools and craft custom exploits for proof-of-concept code
Desired Professional Certifications: Offensive Security Certifications (OSCP, OSCE, OSWP, OSWE, OSEE), SANS GIAC Certifications (GPEN, GWAP, GPYC, GXPN, GSE), Certified Ethical Hacker (CEH)
Experience with collection management processes, capabilities, technical targeting, and reporting

Benefits

Competitive salaries
Industry-leading benefits

Company

Veros Technologies, LLC

twittertwittertwitter
company-logo
Veros Technologies is an innovative small business based in Northern Virginia, focused on providing premier technical consulting services to private and public sector clients.

Funding

Current Stage
Growth Stage

Leadership Team

leader-logo
Joyce Weymouth
CSO
linkedin
Company data provided by crunchbase