Join our Talent Network >

Cyber Security Analyst Red Team Lead

Job ID: 195023
Location: SUFFOLK, VA, United States
Date Posted: Aug 27, 2019
Category: Cyber
Subcategory: Cyber Sec Analyst
Schedule: Full-time
Shift: Day Job
Travel: No
Minimum Clearance Required: TS/SCI
Clearance Level Must Be Able to Obtain: None
Potential for Teleworking: No

Share: mail

Job Description

Description

SAIC has a contingent job opportunity for a Red Team Lead (Cybersecurity) to support the Naval Information Forces Headquarters (NAVIFOR HQ).
 
The scope of the position includes network security engineering, testing, assessment, analysis, and documentation of complex networks designed to provide boundary defense from sophisticated threat actors. Candidates must have a strong understanding of modern network technologies, protocols (e.g. TCP, SMTP, DNS, SSH, etc.), and security practices. Candidates must be well versed in common network scanning tools that support network discovery, compliance reporting, and vulnerability assessment. Candidates must well versed in reviewing, analyzing, and commenting on secure network design, federal security and operational requirements (e.g. NIST SP 800-53r4, CNNSI 1253, etc.). Candidates must be able to adopt a threat actor’s perspective when performing design assurance to ensure these systems are not only compliant, but offer effective security measures against advanced threats. Candidates must be able to communicate plans, findings, and analysis effectively through verbal and written means.
 
This position is contingent upon contract award and will be located in Suffolk, VA.
 

Qualifications

REQUIRED DUTIES:
  • Provide subject matter expertise focusing on red team operations, working to test defensive mechanisms in an organization
  • Build and lead Red Team engagements for our internal customers
  • Provide hands-on, penetration testing and Red Team engagement expertise
  • Conduct vulnerability assessments on a wide variety of technologies and implementations utilizing both automated tools and manual techniques
  • Develop scripts, tools and methodologies to enhance SAIC’s Red Team processes
  • Simulate sophisticated cyberattacks to identify vulnerabilities
  • Develop comprehensive and accurate reports and presentations for both technical and executive audiences
  • Assist in the scoping of prospective engagements, leading engagements from initial stages through implementation and remediation
  • Help mentor and develop less experienced staff
 
CLEARANCE REQUIREMENT:
  • Active TS/SCI
 
QUALIFICATIONS REQUIRED:
  • Experience in Concept and TTP development for emulation of Cyber Adversaries
  • Experience in Exercise planning, MESL development, and execution of COCOM, Fleet, and Special Operations cyber assessments and exercises.
  • Experience in Remote exploitation technical capabilities and TTP.
  • Experience in Close Access Team technical capabilities and TTP.
  • Experience in Management of hardware/software operational infrastructure associated with Red Team types of “attack platforms.”
  • Experience in Operation of commercial and open source network cyber assessment tools (e.g. Core Impact and Rapid7 Metasploit).
  • Experience in Computer network platforms, architecture, programming languages and/or development/testing methodology for networked systems.
  • Experience in Operational Risk Management (ORM) concepts and application.
  • Experience in Application of industry standards for secure software development and lifecycle management.
  • Experience in Design, development, testing, modification and operational application of attack and exploitation tools. (to include familiarity with industry standard software engineering concepts and languages such as C+, Python, PHP, etc.). 
  • Experience in Exploitation and vulnerabilities associated with most common operating systems (Windows, Linux, etc.), protocols (HTTP, FTP, etc.), and network security services (PKI, HTTPS, etc.).
  • Experience in improvising courses of action (COAs) and capability development/modification during operations (i.e. remote access/exploitation and close access team operations) to achieve desired red teaming effects.
  • Experience in Development, modification, and utilization of network enumeration engines, Open Source Research (OSR) engines, and reverse engineering exploitation frameworks.
  • Experience in Development of network systems and architectures to allow Red Team operations in a non-traceable and non-attributable manner.
  • Experience in Development of advanced hacking capabilities (e.g. botnet, client deception, advanced Trojans, data exfiltration, mobile device discovery and exploitation).
 
REQUIRED CERTIFICATIONS:
  • Information Assurance Work Force (IAWF)/Cyber Security Work Force DoD 8570.01-M IAT level II – COMP TIA Security plus (Security +), and relevant operating system.
 
DESIRED:
  • Bachelor’s degree from an accredited institution or four years of experience in lieu of degree.
 

 

Desired Qualifications

 

Overview

SAIC is a premier technology integrator, solving our nation's most complex modernization and systems engineering challenges across the defense, space, federal civilian, and intelligence markets. Our robust portfolio of offerings includes high-end solutions in systems engineering and integration; enterprise IT, including cloud services; cyber; software; advanced analytics and simulation; and training. We are a team of 23,000 strong driven by mission, united purpose, and inspired by opportunity. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $6.5 billion. For more information, visit saic.com. For information on the benefits SAIC offers, see Working at SAIC. EOE AA M/F/Vet/Disability

Share: mail

Similar Jobs

Cyber Security Analyst Red Team Lead

SUFFOLK, VA, United States
Cyber

Cyber Sec Analyst Principal

VIRGINIA BEACH, VA, United States
Cyber

Provide your information to receive jobs that fit you by keywords, location, and more,
and then receive great opportunities based on your skills and experience.

Join our Talent Network >