What are the responsibilities and job description for the Cyber Range Engineer (CRE) position at Axiom Consultants?
This position requires a TOP SECRET/SCI level security clearance. The entirety of the workspace is a Special Compartmented Information Facility (SCIF).
The Cyber Range Engineer (CRE) position has been designated as a Cyber IT/Cybersecurity Workforce position in Specialty Area 67 and as a condition of employment incumbents of the position are required to comply with the DON Cyber IT/CSWF Program requirements of SECNAV M-5239.2. This position shall provide technical and analytical support, assistance, program management, and training for unique tactics, techniques, and procedures (TTP) and information technology required to support the NBT mission.
QUALIFICATIONS REQUIRED:
This position will develop cyber ranges in various environments to give personnel the ability to practice using tools, techniques and procedures without manipulating or causing issues to an operational network. One of the platforms the position will work on is Persistent Cyber Training Environment (PCTE) which requires
Complete Content Range Engineer Basic Course - Candidate must complete and PASS course within 6 months of hire.
Must possess a minimum of five (5) years of experience in providing highly technical subject matter expertise and expert guidance to government personnel in the execution of operations and demonstrated experience in at least five of the following areas:
- Intelligence background with excellent written and oral communications skills, and comfort with technology assisted training environments. Will generate exercise orders, background, intelligence documents, threat assessments, and will conduct cyberspace adversary and terrain research to inform scenario setting and timing and tempo. Familiarity with JCMS is helpful.
- Cyberspace Operations background (DODIN Operations, DCO or OCO) from a leadership/operational/tactical level. Will contribute to building a realistic training scenario and provide leadership perspective on expected actions, plans, reporting and briefing.
- Network engineer with experience working in a virtualized environment. Will develop new infrastructure, or use existing ranges as needed to fulfill scenario requirements. Understand of physical/virtual networks, domains, security applications/appliances, traffic collection, and network monitoring is highly desired.
- Opposing force operations with the ability to use open source tools to emulate adversaries or TTPs based on scenario and terrain requirements. Will be responsible for building detailed operational plans and executing live and scripted actions in support of event rehearsal and execution. Good written and oral communications skill are critical to provide detailed feedback on actions taken to training audience.
- Hands-on experience performing Penetration Tests and Vulnerability Analysis for applications, network infrastructure and operating system infrastructures.
- Conduct system or database performance monitoring and tuning
- Conduct training programs for staff on current and newly developed cyber tools.
- Work closely with an internal cross-functional team to create and/or customize themes, plugins, and extensions to support vulnerability discovery and reporting.
- Developing, reviewing, and implementing mission area-related policy, doctrine, and development of Navy concepts, doctrine, tactics, techniques, and procedures.
- Identifying mission area-related concepts and technologies for examining technology, including protocols, languages, clients, and server architectures, from the attacker's perspective.
- Developing and supporting development of Navy mission areas-related operational concepts, tactics, and experimental concepts and technologies.
- Provide subject matter expertise and guidance utilizing tools and techniques to conduct cyber vulnerability assessments of public facing IP addresses.
- Familiarity with National Institute of Standards and Technology (NIST) Special Publications.
- Complete Content Range Engineer Basic Course
- Working knowledge of the following defensive security techniques and technologies:
- Possess a technical education, certifications, or similar, from the following list:
- Bachelor's or Master's in Cyber, Computer Science or related Engineering discipline
- CompTIA Advanced Security Practitioner (CASP )
- Linux
- Cisco Certified Network Associate (CCNA)
- Azure Administrator Associate
- Azure Solutions Architect Expert
- Azure Security Engineer Associate
- AWS Solutions Architect Associate
- AWS Solutions Architect Professional
- AWS Security
- VMware Certified Design Expert
- Have a working level ability with one or more of the below programing/declarative languages
- Puppet
- Python
- Javascript
- Ruby
- SQL
- Familiarity with Navy Information System Architecture.
REQUIRED DUTIES:
- Interface with Navy stakeholders to gather training input including relevant mission type(s), tools, and training objectives
- Define the content architectural tasks needing completion to achieve range (network) design, development, and configuration; range and user traffic automation; and document creation
- Configure security logging and data shipping in mission network blue space configures security applications organic to mission networks (e.g., HBSS, ACAS, CDS)
- Facilitates integration of virtualized and physical Defensive Cyberspace Operations toolkits (e.g., DDS-M, CVA/H, DMSS)
- Build Cyber Gym Content in PCTE or other similar cyber environments.
- Update and maintain existing Navy cyber range content.
- Assist Navy content creators in cyber range development
- Analyze the results from automated assessment tools to validate findings, determine their business impact, and eliminate false positives.
- Use commercial and open source network cyber assessment tools (e.g. Core Impact, Nmap, Metasploit, and Nessus).
- Manually discover key application flaws.
- Research various cyber actors' TTPs, organizational structures, capabilities, personas, and environments, and integrate findings into Cyber Blue Teaming or penetration test operations.
- Develop and utilize testing methodology for threat emulation and vulnerability validation.
- Develop products and materials required to support development working groups, planning groups, operational planning teams, conferences, table top exercises, war games and operational experiments.
- Coordinate with DOD components prior to scans for proper de-confliction.
- Create in-depth reports that identify risks to networks based on vulnerabilities discovered in the scan results.
- Work with information owners to identify and troubleshoot technical issues prohibiting scanning.
- Coordinate/assist mitigation efforts with site owners.
- Review Navy networks for compliance with applicable DOD and Navy instructions and directives.
- Liaise with various DOD components concerning web vulnerability scanning and compliance guidelines and issues.
Required shift coverage: DAY SHIFT (07:30 AM/0730 - 4:00 PM/1600) working position (Monday - Friday), Remote work as authorized.
#CJ
Salary : $100,000 - $120,000