Support PDF,DOC,DOCX,TXT,XLS,WPD,HTM,HTML fils up to 5MB
Years of Experience
Date Last Verified
ProfilePrincipal Cyberspace Operator - SME Duties: Perform internal and external vulnerability assessments as well as penetration. Perform well controlled vulnerability exploitation/penetration testing on applications, network protocols, and databases. Perform network reconnaissance. Perform forensic analysis on systems. Support cyberspace operations line of effort and course of action development as a member of a small team. Support digital network intelligence and target systems analysis as a member of a small team. Support cyberspace operations weaponeering and cyber capability gap analysis to inform RDT and E efforts. Support network and cyber capability modelling and simulation efforts as a member of a small team. Actively participate in decision making with engagement management and seek to understand the broader impact of current decisions. Generate innovative ideas and challenge the status quo. Facilitate use of technology-based tools or methodologies to review, design and/or implement products and services. Participate in and actively support mentoring relationships within practice.
Qualification and Experience
Qualifications: Bachelor's Degree or equivalent and 9+ years' experience; Master's Degree and 7+ years' experience; PhD or JD Degree and 4 years' experience. Advanced knowledge of offensive cyber operations, vulnerability assessments and penetration testing using manual testing techniques, scripts, commercial and open source tools. Experience in exploiting vulnerabilities. Ability to read, write and modify scripts. Experience with network reconnaissance and open source intelligence (OSINT) gathering. Experience with wireless penetration testing. Experience with password cracking. Ability to read and analyze network packet captures. Experience with security forensic analysis. Experience with firewall, router, and switch security. Experience with incident response. Experience with virus analysis, malware analysis and honeypots. Knowledge of security auditing techniques.