Offensive Cyber Weapon System Manager
Hampton Roads, VA
Applications have closed
About ARSIEM Corporation
At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our government clients. We provide support to multiple agencies across the United States Government. ARSIEM has an experienced workforce of qualified professionals committed to providing the best possible support.
As demand increases, ARSIEM continues to provide reliable and cutting-edge technical solutions at the best value to our clients. That means a career packed with opportunities to grow and the ability to have an impact on every client you work with.
ARSIEM is looking for an Offensive Cyber Weapon System Manager. This position will support one of our Government clients in Hampton, VA.
ARSIEM is proud to be an Equal Opportunity and Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other federally protected class.
At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our government clients. We provide support to multiple agencies across the United States Government. ARSIEM has an experienced workforce of qualified professionals committed to providing the best possible support.
As demand increases, ARSIEM continues to provide reliable and cutting-edge technical solutions at the best value to our clients. That means a career packed with opportunities to grow and the ability to have an impact on every client you work with.
ARSIEM is looking for an Offensive Cyber Weapon System Manager. This position will support one of our Government clients in Hampton, VA.
Responsibilities
- Provide at least monthly briefings to branch leadership on the status of all open requirements for OCO mission systems
- Monitor the performance of OCO mission systems and operations crews and identify positive/negative trends and the ability of current systems to meet mission needs.
- Identify deficiencies impacting operations or system performance.
- Prepare briefings, position papers, background papers, talking papers, and other products for government employees to advocate solutions to operational requirements, mission systems, and crew deficiencies.
- Capture, clarify, validate, and ensure completeness of OCO mission system requirements for delivery to A5/2K for solution resourcing.
- As part of the OCO Weapon System Team, track and attend meetings, working groups, etc., in which OCO mission systems require representation and ensure system development efforts meet requirements, fielding is synchronized with operational tempo, receiving units are postured to incorporate and employ new capabilities as efficiently as possible. The formal training unit is postured and resources to implement initial qualification training on new capabilities.
- Coordinate the sufficiency of operational test activities supporting the fielding of new systems or modifications/upgrades to existing systems.
- Make recommendations to branch leadership to improve testing where planned, or ongoing testing, is insufficient to assess whether or not the performance of a system meets operational requirements.
- Monitor developmental testing and operational testing activities.
- Coordinate and recommend to leadership whether or not to accept a fielding recommendation based on the results of completed testing.
- Create Integrated Master Schedules by creating project schedules for work that must be done to organize forces, develop and implement training for them, and present them and merge them with those of a program office, developing the capabilities of those forces.
- If the program office does not produce a delivery schedule, coordinate to capture relevant development tasks for documentation on the IMS.
- Provide periodic, as determined by leadership, updates on the status of work specified in each IMS for each capability development effort.
Minimum Experience
- Minimum of two (2) years of experience with Air Force NAF, MAJCOM, HAF, USCYBERCOM, and joint staff functions, preferably within the J/A3 or J/A5 directorate.
- Working knowledge of Project Management either in government or corporate settings.
- Experience and working knowledge of the Department of Defense.
- Ability in Atlassian products such as Confluence and JIRA.
- Knowledge of United States Government (USG) program requirements principles, directives, methodologies, and approaches used in developing, managing, conducting, and tracking system requirements and policy and guidance.
- Knowledge of United States Government (USG) cyberspace training principles, directives, methodologies, and approaches to developing, managing, and conducting training programs and events.
- Knowledge of Agile IT system development principles and methodologies, including but not limited to the Scaled Agile Framework
- Understand how operational offensive cyber missions are planned and executed across each mission system.
- Knowledge of MITRE ATT&CK or similar hacking methodologies framework.
- Be able to articulate the process used to execute initial access operations to computer and network systems both remote and locally, including remote techniques such as Man-on-the-Side, Man-in-the-Middle, and target-triggered (e.g., phishing).
- Articulate processes hackers use to execute code and run commands on target systems environments, paired with tactics, techniques, and procedures tactics to steal data, affect data or systems, and maneuver through a network.
- Describe various processes for maintaining persistence within a network.
- Articulate privilege escalation tactics, techniques, and procedures.
- Understand and be able to discuss concepts for evading network defenses, including endpoint security software, Windows and common Linux operating system security features, logging (local and remote), network detection and prevention systems, web proxies, and e-mail gateways.
- Be able to discuss harvesting and cracking various types of credentials.
- Understand how hackers conduct reconnaissance of target networks for initial access planning and lateral movement within a network.
- Articulate tactics, techniques, and procedures for lateral movement in a network.
- Describe TTPs hackers use to remain anonymous if their activity is detected.
- Understand and describe a broad level of command-and-control techniques used to operate malicious software embedded in targeted networks and systems.
- Describe tactics, techniques, and procedures for exfiltrating data from a network.
- Be able to apply knowledge of gaining and maintaining unauthorized and unnoticed access to computer systems, networks, and systems attached to them and assist in the development, maintenance, and execution of training programs and systems used to train operations crews to conduct those activities from fielded mission systems to a specified level of proficiency.
- Bachelor's degree in computer science, computer engineering, or cybersecurity.
- Or 5 years of experience conducting penetration testing against commercial or government entities.
- Or 5 years of offensive cyberspace operations experience in the military.
- Master's degree in one of the above-listed programs is preferred.
ARSIEM is proud to be an Equal Opportunity and Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other federally protected class.
Tags: Agile Clearance Computer Science Endpoint security Jira Linux MITRE ATT&CK Pentesting TS/SCI TTPs Windows
Perks/benefits: Career development Salary bonus Team events
Job stats:
5
0
0
Category:
Leadership Jobs
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Senior Security Analyst jobs
- Open Manager Pentest H/F jobs
- Open Information Security Specialist jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Senior Information Security Analyst jobs
- Open Senior Cyber Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Principal Security Engineer jobs
- Open Product Security Engineer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Senior Information Security Engineer jobs
- Open Chief Information Security Officer jobs
- Open Cybersecurity Analyst jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Cybersecurity Consultant jobs
- Open IT Security Analyst jobs
- Open Consultant SOC / CERT H/F jobs
- Open Security Specialist jobs
- Open Cybersecurity Specialist jobs
- Open Senior Penetration Tester jobs
- Open Sr. Security Engineer jobs
- Open Security Researcher jobs
- Open Senior Security Architect jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Application security-related jobs
- Open ISO 27001-related jobs
- Open Network security-related jobs
- Open Agile-related jobs
- Open Pentesting-related jobs
- Open Vulnerability management-related jobs
- Open GCP-related jobs
- Open Analytics-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open DevOps-related jobs
- Open Kubernetes-related jobs
- Open Malware-related jobs
- Open CI/CD-related jobs
- Open Security Clearance-related jobs
- Open IDS-related jobs
- Open EDR-related jobs
- Open CEH-related jobs