SAIC Cyber Security Analyst Red Team Lead Job in Suffolk, Virginia
Cyber Security Analyst Red Team Lead (Job Number:427404)
SAIC has a contingent job opportunity for a Red Team Lead (Cybersecurity) to support the Naval Information Forces Headquarters (NAVIFOR HQ).
The scope of the position includes network security engineering, testing, assessment, analysis, and documentation of complex networks designed to provide boundary defense from sophisticated threat actors. Candidates must have a strong understanding of modern network technologies, protocols (e.g. TCP, SMTP, DNS, SSH, etc.), and security practices. Candidates must be well versed in common network scanning tools that support network discovery, compliance reporting, and vulnerability assessment. Candidates must well versed in reviewing, analyzing, and commenting on secure network design, federal security and operational requirements (e.g. NIST SP 800-53r4, CNNSI 1253, etc.). Candidates must be able to adopt a threat actor’s perspective when performing design assurance to ensure these systems are not only compliant, but offer effective security measures against advanced threats. Candidates must be able to communicate plans, findings, and analysis effectively through verbal and written means.
This position is contingent upon contract award and will be located in Suffolk, VA.
Provide subject matter expertise focusing on red team operations, working to test defensive mechanisms in an organization
Build and lead Red Team engagements for our internal customers
Provide hands-on, penetration testing and Red Team engagement expertise
Conduct vulnerability assessments on a wide variety of technologies and implementations utilizing both automated tools and manual techniques
Develop scripts, tools and methodologies to enhance SAIC’s Red Team processes
Simulate sophisticated cyberattacks to identify vulnerabilities
Develop comprehensive and accurate reports and presentations for both technical and executive audiences
Assist in the scoping of prospective engagements, leading engagements from initial stages through implementation and remediation
Help mentor and develop less experienced staff
- Active TS/SCI
Experience in Concept and TTP development for emulation of Cyber Adversaries
Experience in Exercise planning, MESL development, and execution of COCOM, Fleet, and Special Operations cyber assessments and exercises.
Experience in Remote exploitation technical capabilities and TTP.
Experience in Close Access Team technical capabilities and TTP.
Experience in Management of hardware/software operational infrastructure associated with Red Team types of “attack platforms.”
Experience in Operation of commercial and open source network cyber assessment tools (e.g. Core Impact and Rapid7 Metasploit).
Experience in Computer network platforms, architecture, programming languages and/or development/testing methodology for networked systems.
Experience in Operational Risk Management (ORM) concepts and application.
Experience in Application of industry standards for secure software development and lifecycle management.
Experience in Design, development, testing, modification and operational application of attack and exploitation tools. (to include familiarity with industry standard software engineering concepts and languages such as C+, Python, PHP, etc.).
Experience in Exploitation and vulnerabilities associated with most common operating systems (Windows, Linux, etc.), protocols (HTTP, FTP, etc.), and network security services (PKI, HTTPS, etc.).
Experience in improvising courses of action (COAs) and capability development/modification during operations (i.e. remote access/exploitation and close access team operations) to achieve desired red teaming effects.
Experience in Development, modification, and utilization of network enumeration engines, Open Source Research (OSR) engines, and reverse engineering exploitation frameworks.
Experience in Development of network systems and architectures to allow Red Team operations in a non-traceable and non-attributable manner.
Experience in Development of advanced hacking capabilities (e.g. botnet, client deception, advanced Trojans, data exfiltration, mobile device discovery and exploitation).
- Information Assurance Work Force (IAWF)/Cyber Security Work Force DoD 8570.01-M IAT level II – COMP TIA Security plus (Security +), and relevant operating system.
- Bachelor’s degree from an accredited institution or four years of experience in lieu of degree.
SAIC Overview:SAIC is a premier technology integrator providing full life cycle services and solutions in the technical, engineering, intelligence, and enterprise information technology markets. SAIC provides systems engineering and integration offerings for large, complex projects. Headquartered in McLean, Virginia, SAIC has approximately 15,000 employees and annual revenues of about $4.3 billion.
EOE AA M/F/Vet/Disability
Job Posting: Jun 1, 2017, 4:00:00 AM
Primary Location: United States-VA-SUFFOLK
Clearance Level Must Currently Possess: Top Secret/SCI
Clearance Level Must Be Able to Obtain: Top Secret/SCI
Potential for Teleworking: No
Shift: Day Job