NOTE: Active TS-SCI clearance required. Preference given to candidates with DHS EOD.
Duties/Responsibilities
The scope of the position includes security engineering, testing, analysis, documentation, and design assurance of complex, carrier grade networks designed to provide boundary defense from sophisticated threat actors. You must have a strong understanding of modern network technologies, protocols (e.g. TCP, SMTP, DNS, SSH, etc.), and security practices. Candidates must well versed in reviewing, analyzing, and commenting on secure network design, federal security and operational requirements (e.g. NIST SP 800-53r4, CNNSI 1253, etc.). Candidates must be able to adopt a threat actor’s perspective when performing design assurance to ensure these systems are not only compliant, but offer effective security measures against advanced threats. You will be required to develop clear, thoughtful, and actionable recommendations to improve the security of these systems and must be able to communicate these recommendations effectively through verbal and written means. There is a small amount of travel (less than 10%) expected.
As a Junior Security Engineer (Red Team), you will use your experience in the following areas and activities to deliver solutions and services to our customers:
- Emulate modern attacker tools, techniques, and procedures (TTPs) to evaluate the ability of clients to detect and respond appropriately during red team engagements.
- Use adversarial approaches while performing a full range of penetration tests including network, system, web application, social, and internet-of-things devices.
- Think “outside of the box” to give our clients a unique perspective on their holistic security posture.
- Participate and lead efforts to develop new cyber capabilities and methodologies.
- Review and critique system and network security solutions, applying your knowledge and experience to evaluate alignment with operational and mission requirements over a range of metrics including scalability, maintainability, security, reliability, flexibility, availability, and manageability.
- Constantly evaluate and improve our approaches and maintain awareness of latest testing and ethical hacking methods.
- Develop detailed reports on findings and remediation recommendations catered to a range of stakeholders from executive management to technical staff.
Day-to-Day Responsibilities include:
- Act as network security subject matter expert working on behalf of the customer to review system designs submitted for approval by the government.
- Participate and lead Technical Exchange Meetings with the government Program Management Office (PMO) and commercial service providers to discuss system designs and provide recommendations.
- Review, evaluate, and recommend action for change requests and plans of action and milestones (POA&Ms).
- Utilize knowledge of NIST 800-53 Rev 3&4 and CNSSI 1253 controls to evaluate system compliance.
- Review and evaluate systems security documentation, software code, configuration files, SSPs, SECONOPS for compliance and vulnerabilities.
- Design, build, and operate virtualized environments used to simulate commercial service provider systems prior to onsite assessment.
- Work with red team and penetration testers to develop detailed test and assessment plans to be used during onsite security assessment.
- Leverage systems and networking skills to evaluate and exploit vulnerabilities from insider threat and external threat perspective.
- Participate in the design and implementation of reference models and security architectures for prototyping new countermeasures and capabilities.
Required Qualifications
The scope of the position includes security engineering, testing, analysis, documentation, and design assurance of complex, carrier grade networks designed to provide boundary defense from sophisticated threat actors. You must have a strong understanding of modern network technologies, protocols (e.g. TCP, SMTP, DNS, SSH, etc.), and security practices.
Candidates must well versed in reviewing, analyzing, and commenting on secure network design, federal security and operational requirements (e.g. NIST SP 800-53r4, CNNSI 1253, etc.). Candidates must be able to adopt a threat actor’s perspective when performing design assurance to ensure these systems are not only compliant, but offer effective security measures against advanced threats. You will be required to develop clear, thoughtful, and actionable recommendations to improve the security of these systems and must be able to communicate these recommendations effectively through verbal and written means.
There is a small amount of travel (less than 10%) expected. Bachelor’s Degree in Computer Science, Networking, Cybersecurity or related technical field. Five (5) years of experience in the following areas:
- Experience leading and conducting network-based audits and penetration testing.
- Experience with wide range of COTS software, such as Metasploit or CobaltStrike, and open source software packages including PowerShell Empire, Kali Linux, etc.
- Experience with virtualization technologies including VMWare, AWS, Azure.
- Knowledge and experience using and securing Linux and Windows-based operating systems.
- Network protocol analysis and troubleshooting.
- Self-starter with proven ability to multitask and manage project delivery timelines.
- Ability to create scripts and programs to assist in analysis or testing in various languages including PowerShell, Bash, Python, Ruby, C#, Perl, etc.
- Ability to explain findings to non-technical professionals.
- Excellent report writing and presentation skills.
- Customer facing “soft skills” with a proven track-record of building client relationships.
- Able to work independently but also as part of a team.
- Flexibility to change direction and manage conflicting demands.
- Comfortable working in a fast-paced environment.
Preferred Qualifications
- Familiarity with federal information security standards (NIST SP 800-53r4, FedRAMP, CNNSI 1253, etc.) and practical experience implementing solutions that comply with these standards.
- Code Analysis.
- Advanced network protocol manipulation.
- Demonstrated advanced red team operations experience to include threat-modeling and dynamic approaches beyond “standard penetration testing”.
- Industry recognized technical certifications: OSCP, OSCE, GPEN, GXPN.
- Two or more years of consulting experience.
- Demonstrated ability to apply problem-solving skillset to develop solutions specific to client capabilities to meet identified threats.
- Windows server and Active Directory administration.