Red Cyber Security Operator, Fort Belvoir, VA – Cherokee Federal Fort Belvoir, VA
Note: We may earn a commission from products or services when you click on a link and make a purchase.
Red Cyber Space Operator, Fort Beloit, VA
Join the team who values your skills and expertise. From intelligence and cybersecurity to vulnerability assessment and mission assurance, Cherokee Nation Strategic Programs (CNSP) brings experience and results. Building on a reputation as a dedicated, disciplined and tightly knit organization, CNSP supports DOD and other federal clients in their critical, strategic and operational programs. CNSP is looking for qualified talent to give our clients the support they deserve and the quality they expect from our team – a team of experts, like you.
Cherokee Nation Strategic Programs is part of Cherokee Federal – a team of tribally owned federal contracting companies focused on building solutions, solving complex challenges, and serving the nation’s mission around the globe for more than 60 federal clients.
The Mission Assurance Assessment Program model for the Defense Threat Reduction Agency (DTRA) is designed to support commanders’ risk management processes, providing an assessment of potential risk to assets determined as critical to the execution of strategic missions. DTRA is a dynamic organization with an unparalleled team of professionals and work culture. DTRA is looking for a Red Cyber Space Operator to support their mission.
The Red Cyber Space Operator will support Defense Threat Reduction Agency- Cyber Division to emulate a potential adversary’s cyber reconnaissance, exploitation techniques, and attack capabilities against a targeted mission, system, network, component, or capability.
Essential Duties & Responsibilities
- Emulate a potential adversary’s offensive cyberspace operations and exploitation techniques against a targeted mission, system, network, component, or capability.
- Act on information gathered from readily available open source internet resources to identify exposed or compromised information, vulnerabilities and misconfigurations.
- Employ tools against these compromises, to demonstrate a loss of confidence in the target’s functional and security posture forcing the target to operate in a degraded, disrupted, or denied cyber environment. Red Cyber Operators will be assigned to both White and Red Cells.
- Prior to physical assessment operations, the Red Cyber Operators will work closely with Red Cyber Analysts to identify targets, research, scan, and map networks. During these components of the assessment, Red Cyber Operators will not deliver effects that could be categorized as anything but Reconnaissance or collecting technical targeting data
- Gather information for network and information system characterization, identifying and gathering information on organizations through users that are determined to be of high value in answering PIRs or in the development of follow-on Red Team operations.
- Will demonstrate a potential adversary’s offensive based cyberspace operations or intelligence collection capabilities against a targeted mission or capability. Demonstrations will be performed under a “White Card” and conform to ethical, aka white hat hacking principles.
- All activities performed by Red Cyber Operators will comply with all US Cyber Command Standing Ground Rules. Provide oral and written communication regarding deficiencies and methods of correction and renders technical advice regarding condition of networks and information systems at the computing, network, and enclave information technology environments.
- Characterize the adversary. Research the structure, ideology, intentions, tactics, and capabilities of adversarial organizations to develop threat characterization using a combination of both classified and unclassified sources.
- Contribute to threat emulation. Identify information requirements, develop assessment strategies and collection plans, identify information sources, and develop and conduct research of publicly available information (PAI) in order to determine adversary courses of action and relevant information requirements (IR).
- Analyze and characterize targeted mission, system, network, component, or capability and conduct analysis appropriate to the program, identify essential functions/tasks and critical assets necessary to perform them as determined by the program leader.
- Contribute to developing adversary courses of action (CoA). Develop courses of action an adversary could employ in and through cyberspace directed against customer personnel, equipment, facilities, networks, information and information systems, infrastructure, and supply chains.
- Support field assessments from an adversary perspective. In conjunction with DoD Red Team Partners, conduct field assessments and demonstrate cyber courses of actions in accordance with Program Plans, operations orders, ground rules, and other directives.
- Synthesize findings to support vulnerability identification, course of action development, protection studies, trend analyses, risk analysis, and mitigation strategies.
- Develop a comprehensive understanding of the implications of vulnerabilities discovered by the other specialists and fuse those findings with the systems analysis and determine impacts to the national and military missions they support.
- Prepare activity reports including out briefs, senior leader briefs, interim progress reports (IPRs) and briefs, white papers, after action reviews, final reports, risk analysis products, and other documents necessary to convey assessment findings to customers, partners, and other stakeholders.
- Preparing Assessment Team Reports based upon vulnerabilities observed during the assessment.
- Conducting other assessment areas defined by the SME Benchmark matrix
Need Security Training? Certifications at Your Own Pace
- This position will not have supervisory or management authority
Education And/or Experience
- Possess a Bachelor’s (BS) or Master’s (MS) degree in a Computer Science, Computer Forensics, Computer Engineering, Electrical Engineering, or a related technical discipline
- Preferred, with a BS, possess a minimum of 7 years (MS, 5 years) demonstrated operational experience in the military, other Federal Government or comparable civilian position in Cyberspace Operations (Offensive Cyberspace Operations,
- Defensive Cyberspace Operations, and Cyberspace Exploitation) Cyber Red Team, Penetration Testing, and/or Information Operations (IO).
- Red Cyber Space Operators must have at least one year of operational experience implementing attack scenarios against live or simulated cyber systems, networks, or infrastructure.
- Demonstrated experience with at least one automation scripting language (Powershell, Python, Perl, Ruby, Java, etc)
Knowledge, Skills And Abilities
- Understanding of Information Assurance and computer network defense concepts, practices and tools to design, administer, and evaluate vulnerabilities (physical and cyber) to classified and unclassified DoD computer networks and systems.
- Understanding of Information Technology security certification and accreditation requirements sufficient to provide recommendations to customers.
- Must meet certification requirements outline in DoD 8570.01-M for Computer Network Defense Auditor (CND-AU) within 6 months of employment.
- Knowledge of DoDI 8510.01, DoDI 8500.01, and NIST SP 800 series
- Knowledge of the DoD Risk Management Framework.
- Knowledge of the Cybersecurity program to include experience working with commercial and military networks and communication systems.
- Ability to handle multiple tasks with little to no supervision.
- Ability to recommend solutions for mitigation and remediation of information and communication systems based on doctrine, requirements, instructions, national industry standards and best practices.
- Capable to write assessment reports that can be understood at multiple levels.
- Knowledge, Training, or understanding of working with ICS/SCADA or IoT devices. GICSP, GCIP, GRID or ISA/IEC desirable.
- Have at least five demonstrated years of using open source tools and operating systems or hold a comparable Linux certification
- Possess working knowledge of Department of Defense’s Cybersecurity Vulnerability Alert and Incident Response process
- Possess IAT Level III certification and CSSP Auditor certification as defined and described in Joint Publication 3-13 Information Operations and 3-12 Cyberspace Operations, DoDI 8500.1and DoD 8570.01 and 8570.01-M, and as amended
- Excellent communications skills; both oral and written
- Have a working knowledge of Computer Network vulnerability/compliance analysis software as well as working knowledge of RMF processes
- Possess a working knowledge of Microsoft Office Suite to include an ability to prepare PowerPoint presentations, reports, and white papers.
- Current active TS SCI clearance verifiable in JPAS
- Travel and overnight stay often required (50% of time).
- The ability to successfully pass a drug screen and a federal background check is mandatory
- This position is performed in a climate controlled office environment at Fort Belvoir, VA.
Pursuant to U.S. Presidential Executive Order 14042, Cherokee Federal is now requiring that all employees be fully vaccinated for COVID-19 by December 8th and going forward. Prospective employees will fall under this requirement and proof of vaccination will be required for on-boarding, should you be selected. Limited exemptions for religious or medical reasons will be considered.
About Cherokee – Federal
Cherokee Federal – a division of Cherokee Nation Businesses – is a team of tribally owned federal contracting companies focused on building solutions, solving complex challenges, and serving the nation’s mission around the globe for more than 60 federal clients. Our team of companies manages nearly 1,000 projects of all sizes across the construction, consulting, engineering and manufacturing, health, and technology portfolios.
Since 2012, the Cherokee Federal team of companies has won more than $5 billion in government contracts. Our 3,000+ employees work in 26 countries, 50 states and 2 U.S. territories.
Why choose Cherokee Federal? Visit our website and learn about the great reasons to join our team. cherokee-federal.com
Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information.
We are an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected Veteran status, gender identity and sexual orientation. If you’d like more information about your EEO rights as an applicant under the law, please copy and paste the links to the following two sites: EEO Statement | EEO Poster ; https://www.dol.gov/ofccp/regs/compliance/posters/pdf/eeopost.pdf and https://www.dol.gov/ofccp/regs/compliance/posters/pdf/ofccp_eeo_supplement_final_jrf_qa_508c.pdf
If you are an individual with a disability and require a reasonable accommodation to complete any part of the application process, or are limited in the ability or unable to access or use this online application process and need an alternative method for applying, you may e-mail CNB.Compliance@cn-bus.com for assistance. This email address is for accommodation requests only and cannot be used to inquire about the application process or status.
For Pay Transparency Non Discrimination provision, please copy and paste the following link: Pay Transparency Nondiscrimination Provision ; https://www.dol.gov/ofccp/pdf/pay-transp_%20English_formattedESQA508c.pdf
We maintain an Affirmative Action Plan for proactively seeking employment and advancement for qualified protected veterans and individuals with disabilities. Upon request, we will schedule time to make our Affirmative Action Plan accessible. If you are interested, please submit a written request with the email subject line: 2021 Request to View Affirmative Action Plan to the Compliance Administrator at “CNB.Compliance@cn-bus.com” This email box is not for resumes or follow up on job applications.