Offensive Cyber Weapon System Manager

Hampton Roads, VA

Applications have closed

ARSIEM

Advanced IT Consulting Solutions

View company page

About ARSIEM Corporation
At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our government clients.  We provide support to multiple agencies across the United States Government.  ARSIEM has an experienced workforce of qualified professionals committed to providing the best possible support.
As demand increases, ARSIEM continues to provide reliable and cutting-edge technical solutions at the best value to our clients.  That means a career packed with opportunities to grow and the ability to have an impact on every client you work with. 
ARSIEM is looking for an Offensive Cyber Weapon System Manager. This position will support one of our Government clients in Hampton, VA.

Responsibilities

  • Provide at least monthly briefings to branch leadership on the status of all open requirements for OCO mission systems 
  • Monitor the performance of OCO mission systems and operations crews and identify positive/negative trends and the ability of current systems to meet mission needs. 
  • Identify deficiencies impacting operations or system performance. 
  • Prepare briefings, position papers, background papers, talking papers, and other products for government employees to advocate solutions to operational requirements, mission systems, and crew deficiencies.  
  • Capture, clarify, validate, and ensure completeness of OCO mission system requirements for delivery to A5/2K for solution resourcing.
  • As part of the OCO Weapon System Team, track and attend meetings, working groups, etc., in which OCO mission systems require representation and ensure system development efforts meet requirements, fielding is synchronized with operational tempo, receiving units are postured to incorporate and employ new capabilities as efficiently as possible. The formal training unit is postured and resources to implement initial qualification training on new capabilities.
  • Coordinate the sufficiency of operational test activities supporting the fielding of new systems or modifications/upgrades to existing systems. 
  • Make recommendations to branch leadership to improve testing where planned, or ongoing testing, is insufficient to assess whether or not the performance of a system meets operational requirements. 
  • Monitor developmental testing and operational testing activities.
  • Coordinate and recommend to leadership whether or not to accept a fielding recommendation based on the results of completed testing. 
  • Create Integrated Master Schedules by creating project schedules for work that must be done to organize forces, develop and implement training for them, and present them and merge them with those of a program office, developing the capabilities of those forces.
  • If the program office does not produce a delivery schedule, coordinate to capture relevant development tasks for documentation on the IMS.
  • Provide periodic, as determined by leadership, updates on the status of work specified in each IMS for each capability development effort.

Minimum Experience

  • Minimum of two (2) years of experience with Air Force NAF, MAJCOM, HAF, USCYBERCOM, and joint staff functions, preferably within the J/A3 or J/A5 directorate.
  • Working knowledge of Project Management either in government or corporate settings.
  • Experience and working knowledge of the Department of Defense.
  • Ability in Atlassian products such as Confluence and JIRA.
  • Knowledge of United States Government (USG) program requirements principles, directives, methodologies, and approaches used in developing, managing, conducting, and tracking system requirements and policy and guidance.
  • Knowledge of United States Government (USG) cyberspace training principles, directives, methodologies, and approaches to developing, managing, and conducting training programs and events.
  • Knowledge of Agile IT system development principles and methodologies, including but not limited to the Scaled Agile Framework
  • Understand how operational offensive cyber missions are planned and executed across each mission system.
  • Knowledge of MITRE ATT&CK or similar hacking methodologies framework.
  • Be able to articulate the process used to execute initial access operations to computer and network systems both remote and locally, including remote techniques such as Man-on-the-Side, Man-in-the-Middle, and target-triggered (e.g., phishing).
  • Articulate processes hackers use to execute code and run commands on target systems environments, paired with tactics, techniques, and procedures tactics to steal data, affect data or systems, and maneuver through a network.
  • Describe various processes for maintaining persistence within a network.
  • Articulate privilege escalation tactics, techniques, and procedures.
  • Understand and be able to discuss concepts for evading network defenses, including endpoint security software, Windows and common Linux operating system security features, logging (local and remote), network detection and prevention systems, web proxies, and e-mail gateways.
  • Be able to discuss harvesting and cracking various types of credentials.
  • Understand how hackers conduct reconnaissance of target networks for initial access planning and lateral movement within a network.
  • Articulate tactics, techniques, and procedures for lateral movement in a network.
  • Describe TTPs hackers use to remain anonymous if their activity is detected.
  • Understand and describe a broad level of command-and-control techniques used to operate malicious software embedded in targeted networks and systems.
  • Describe tactics, techniques, and procedures for exfiltrating data from a network.
  • Be able to apply knowledge of gaining and maintaining unauthorized and unnoticed access to computer systems, networks, and systems attached to them and assist in the development, maintenance, and execution of training programs and systems used to train operations crews to conduct those activities from fielded mission systems to a specified level of proficiency.
  • Bachelor's degree in computer science, computer engineering, or cybersecurity.
  • Or 5 years of experience conducting penetration testing against commercial or government entities.
  • Or 5 years of offensive cyberspace operations experience in the military. 
  • Master's degree in one of the above-listed programs is preferred.
Clearance Requirement: This position requires an active TS/SCI clearance. You must be a US Citizen for consideration. Candidate Referral: Do you know someone who would be GREAT at this role? If you do, ARSIEM has a way for you to earn a bonus through our referral program for persons presenting NEW (not in our resume database) candidates who are successfully placed on one of our projects. The bonus for this position is $3,500,  and the referrer is eligible to receive the sum for any applicant we place within 12 months of referral. The bonus is paid after the referred employee reaches 6 months of employment.
ARSIEM is proud to be an Equal Opportunity and Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other federally protected class.

Tags: Agile Clearance Computer Science Endpoint security Jira Linux MITRE ATT&CK Pentesting TS/SCI TTPs Windows

Perks/benefits: Career development Salary bonus Team events

Job stats:  5  0  0
Category: Leadership Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.