Cyber Range Engineer (Cre)

Angarai Coronado , CA 92118

Posted 2 weeks ago

Job Title: Cyber Range Engineer (CRE)

Job Location: Coronado, CA

Required shift coverage: DAY SHIFT (07:30 AM/0730 - 4:00 PM/1600)

Last day to apply: 24-Oct-2023

Job Type: Remote

ANGARAI - Project Management firm based out of College Park, MD.

ANGARAI is a professional management firm that is driven by excellence. We provide ample opportunities for growth in a challenging, yet closely-knit atmosphere. Our key focus is on providing holistic solutions that is a win-win for both the Client (State, Federal, or Private) and us.

Job Description:

ANGARAI is seeking a professional Cyber Range Engineer for a client project. This position will develop cyber ranges in various environments to give personnel the ability to practice using tools, techniques and procedures without manipulating or causing issues to an operational network. One of the platforms the position will work on is Persistent Cyber Training Environment (PCTE)

Roles and Responsibilities:

  • Interface with Navy stakeholders to gather training input including relevant mission type(s), tools, and training objectives

  • Define the content architectural tasks needing completion to achieve range (network) design, development, and configuration; range and user traffic automation; and document creation

  • Configure security logging and data shipping in mission network blue space configures security applications organic to mission networks (e.g., HBSS, ACAS, CDS)

  • Facilitates integration of virtualized and physical Defensive Cyberspace Operations toolkits (e.g., DDS-M, CVA/H, DMSS)

  • Build Cyber Gym Content in PCTE or other similar cyber environments.

  • Update and maintain existing Navy cyber range content.

  • Assist Navy content creators in cyber range development

  • Analyze the results from automated assessment tools to validate findings, determine their business impact, and eliminate false positives.

  • Use commercial and open source network cyber assessment tools (e.g. Core Impact, Nmap, Metasploit, and Nessus).

  • Manually discover key application flaws.

  • Research various cyber actors' TTPs, organizational structures, capabilities, personas, and environments, and integrate findings into Cyber Blue Teaming or penetration test operations.

  • Develop and utilize testing methodology for threat emulation and vulnerability validation.

  • Develop products and materials required to support development working groups, planning groups, operational planning teams, conferences, table top exercises, war games and operational experiments.

  • Coordinate with DOD components prior to scans for proper de-confliction.

  • Create in-depth reports that identify risks to networks based on vulnerabilities discovered in the scan results.

  • Work with information owners to identify and troubleshoot technical issues prohibiting scanning.

  • Coordinate/assist mitigation efforts with site owners.

  • Review Navy networks for compliance with applicable DOD and Navy instructions and directives.

  • Liaise with various DOD components concerning web vulnerability scanning and compliance guidelines and issues.

Minimum Education and Qualifications:

  • Complete Content Range Engineer Basic Course - Candidate must complete and PASS course within 6 months of hire.

  • Must possess a minimum of five (5) years of experience in providing highly technical subject matter expertise and expert guidance to government personnel in the execution of operations and demonstrated experience in at least five of the following areas:

  • Intelligence background with excellent written and oral communications skills, and comfort with technology assisted training environments. Will generate exercise orders, background, intelligence documents, threat assessments, and will conduct cyberspace adversary and terrain research to inform scenario setting and timing and tempo. Familiarity with JCMS is helpful.

  • Cyberspace Operations background (DODIN Operations, DCO or OCO) from a leadership/operational/tactical level. Will contribute to building a realistic training scenario and provide leadership perspective on expected actions, plans, reporting and briefing.

  • Network engineer with experience working in a virtualized environment. Will develop new infrastructure, or use existing ranges as needed to fulfill scenario requirements. Understand of physical/virtual networks, domains, security applications/appliances, traffic collection, and network monitoring is highly desired.

  • Opposing force operations with the ability to use open source tools to emulate adversaries or TTPs based on scenario and terrain requirements. Will be responsible for building detailed operational plans and executing live and scripted actions in support of event rehearsal and execution. Good written and oral communications skill are critical to provide detailed feedback on actions taken to training audience.

  • Hands-on experience performing Penetration Tests and Vulnerability Analysis for applications, network infrastructure and operating system infrastructures.

  • Conduct system or database performance monitoring and tuning

  • Conduct training programs for staff on current and newly developed cyber tools.

  • Work closely with an internal cross-functional team to create and/or customize themes, plugins, and extensions to support vulnerability discovery and reporting.

  • Developing, reviewing, and implementing mission area-related policy, doctrine, and development of Navy concepts, doctrine, tactics, techniques, and procedures.

  • Identifying mission area-related concepts and technologies for examining technology, including protocols, languages, clients, and server architectures, from the attacker's perspective.

  • Developing and supporting development of Navy mission areas-related operational concepts, tactics, and experimental concepts and technologies.

  • Provide subject matter expertise and guidance utilizing tools and techniques to conduct cyber vulnerability assessments of public facing IP addresses.

  • Familiarity with National Institute of Standards and Technology (NIST) Special Publications.

  • Complete Content Range Engineer Basic Course

  • Working knowledge of the following defensive security techniques and technologies:

  • Possess a technical education, certifications, or similar, from the following list:

  • Bachelor's or Master's in Cyber, Computer Science or related Engineering discipline

  • CompTIA Advanced Security Practitioner (CASP+)

  • Linux +

  • Cisco Certified Network Associate (CCNA)

  • Azure Administrator Associate

  • Azure Solutions Architect Expert

  • Azure Security Engineer Associate

  • AWS Solutions Architect Associate

  • AWS Solutions Architect Professional

  • AWS Security

  • VMware Certified Design Expert

  • Have a working level ability with one or more of the below programing/declarative languages

  • Puppet

  • Python

  • Javascript

  • Ruby

  • SQL

  • Familiarity with Navy Information System Architecture.

icon no score

See how you match
to the job

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove

Cyber Range Engineer (Cre)

Angarai