Offensive Cyber Weapon System Manager
Hampton, VA, United States
Applications have closed
ANALYGENCE, Inc.
Company Description
ANALYGENCE, derived from a combination of Analysis & Intelligence, is a service-disabled veteran-owned professional services small business established in 2010. We were built on the principle of providing our customers with results driven professionals that understand the dynamic customer environment and can be relied upon to help them achieve their objectives. ANALYGENCE works with customers to develop and execute innovative strategies to improve processes and achieve customer goals. Our people are service-oriented professionals with varying military, government, and industry backgrounds, who understand the level of commitment and flexibility it takes to progress customers forward in a dynamic work environment. Our vision is to support, nurture, and inspire people to achieve the missions of our customers and our organization.
Job Description
ANALYGENCE is seeking cleared Cyber Professionals who want to thrive in a growing company. We provide support to Headquarters Air Combat Command (HQ ACC) at Langley Air Force Base, Virginia which includes a full range of Information Warfare training and operations, Information Systems & Operations, Communications, Administrative Support, and Knowledge Based Services across the air, space, and cyber domains. Relocation Assistance available for well-qualified candidates.
The Offensive Cyber Weapon System Management role performs tasks in support of the A326KO mission.
- Provide at least monthly briefings to branch leadership on the status of all open requirements for OCO mission systems
- Monitor performance of OCO mission systems and operations crews and identify positive/negative trends and the ability of current systems to meet mission needs.
- Identify, deficiencies impacting operations or system performance.
- Prepare briefings, position papers, background papers, talking papers, and other products for government employees to use in advocating solutions to operational requirements or mission system and/or crew deficiencies.
- Capture, clarify, validate, and ensure completeness of OCO mission system requirements for delivery to A5/2K for solution resourcing.
- As part of the OCO Weapon System Team track and attend A5/2K meetings, working groups, etc., in which OCO mission systems require representation and ensure system development efforts meet requirements, fielding is synchronized with operational tempo, receiving units are postured to incorporate and employ new capabilities as efficiently as possible, and the formal training unit is postured and resources to implement initial qualification training on new capabilities.
- Coordinate on the sufficiency of operational test activities supporting the fielding of new systems or modifications/upgrades to existing systems. Make recommendations to branch leadership to improve testing where planned, or on going testing, is insufficient to assess whether or not the performance of a system meets operational requirements. Monitor developmental testing and operational testing activities in close coordination with A5/2K, the PMO, and testing squadrons.
- Coordinate on, and make recommendations to leadership, on whether or not to accept a fielding recommendation based on the results of completed testing.
- Create Integrated Master Schedules through creating project schedules for work that must be done to organize forces, develop and implement training for them, and present them and merging them with those of a program office developing the capability(ies) those forces with receive and be trained to employ. If the program office does not produce a delivery schedule, coordinate to capture relevant development tasks for documentation on the IMS.
- Provide periodic, as determined by leadership, updates on the status of work specified in each IMS for each capability development effort.
Qualifications
- Must have current TS/SCI eligibility.
- Bachelors’ degree in computer science, computer engineering, or cybersecurity, OR 5 years’ experience conducting penetration testing against commercial or government entities OR 5 years offensive cyberspace operations experience in the military. Masters’ degree in one of the above listed programs preferred.
- Minimum of two (2) years' experience with Air Force NAF, MAJCOM, HAF, USCYBERCOM, and/or joint staff functions. Preferably within the J/A3 or J/A5 directorate.
- Working knowledge of Project Management either in government or corporate settings.
- Experience and working knowledge of Department of Defense
- Ability in Atlassian products such as Confluence and JIRA
- Knowledge of United States Government (USG) program requirements principles, directives, methodologies, and approaches used in developing, managing, conducting, and tracking system requirements and policy and guidance.
- Knowledge of United States Government (USG) cyberspace training principles, directives, methodologies, and approaches used in developing, managing, and conducting training programs and events.
- Knowledge agile IT system development principles and methodologies, to include but not limited to the Scaled Agile Framework
- Understand how operational offensive cyber missions are planned and executed across each mission system.
- Knowledge of MITRE ATT&CK or similar hacking methodologies framework
- Be able to articulate the process used to execute initial access operations to gain entry into computer and network systems both remote and locally. To include but not limited to remote techniques such as Man-on-the-Side, Man-in-the-Middle, and target-triggered (e.g. phishing).
- Articulate processes hacker use to execute code and run commands on target systems environments, paired with tactics, techniques, and procedures tactics to steal data, affect data or systems, and maneuver through a network
- Describe various process for maintaining persistence within a network
- Articulate privilege escalation tactics, techniques and procedures
- Understand and be able to discuss concepts for evading network defenses to include, but not limited to evading endpoint security software, Windows and common Linux operating system security features, logging (local and remote), network detection and prevention systems, web proxies, and e-mail gateways.
- Be able to discuss harvesting and cracking various types of credentials
- Understand how hackers conduct reconnaissance of target networks for initial access planning and lateral movement within a network
- Articulate tactics, techniques and procedures for lateral movement in a network.
- Describe TTPs hackers use to remain anonymous if their activity is detected.
- Understand and describe a broad level of command and control techniques used to operate malicious software embedded in targeted networks and systems.
- Describe tactics, techniques and procedure for exfiltrating data from a network.
- Be able to apply knowledge of gaining and maintaining unauthorized and unnoticed access to computer systems, networks and systems attached to them to assist in the development, maintenance, and execution of training programs and systems used to train operations crews to conduct those activities from fielded mission systems to a specified level of proficiency.
Additional Information
ANALYGENCE is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decision without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class.
ANALYGENCE requires all employees to be fully vaccinated against COVID-19. In accordance with applicable law, ANALYGENCE may provide an exemption to this requirement as a reasonable accommodation due to a disability or a sincerely held religious belief or practice that prevents receipt of the vaccine.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Agile Computer Science Confluence Endpoint security Jira Linux MITRE ATT&CK OCO Pentesting TS/SCI TTPs Windows
Perks/benefits: Relocation support Team events
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Staff Security Engineer jobs
- Open Information Security Specialist jobs
- Open Senior Security Analyst jobs
- Open Security Operations Engineer jobs
- Open Senior Cyber Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Senior Information Security Analyst jobs
- Open Product Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Cybersecurity Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Principal Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open Senior Information Security Engineer jobs
- Open Consultant SOC / CERT H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Specialist jobs
- Open Security Specialist jobs
- Open Security Researcher jobs
- Open Chief Information Security Officer jobs
- Open Senior Penetration Tester jobs
- Open Senior Security Architect jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Senior Cyber Security Specialist jobs
- Open IT Security Engineer jobs
- Open Agile-related jobs
- Open ISO 27001-related jobs
- Open Application security-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open Pentesting-related jobs
- Open CISM-related jobs
- Open Vulnerability management-related jobs
- Open GCP-related jobs
- Open Analytics-related jobs
- Open SaaS-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open CISA-related jobs
- Open Security assessment-related jobs
- Open DevOps-related jobs
- Open Java-related jobs
- Open Kubernetes-related jobs
- Open Security Clearance-related jobs
- Open EDR-related jobs
- Open Malware-related jobs
- Open IDS-related jobs
- Open APIs-related jobs
- Open CEH-related jobs
- Open CI/CD-related jobs