Offensive Cyber Weapon System Manager

New!

The Kenjya-Trusant Group, LLC Hampton , Virginia 68458

Posted Today

Kenjya-Trusant is seeking aOffensive Cyber Weapon System Manager to provide support to Headquarters Air Combat Command (HQ ACC) at Langley Air Force Base, Virginia. Support includes a full range of Information Warfare training and operations, Information Systems & Operations, Communications, Administrative Support, and Knowledge Based Services across the air, space, and cyber domains.Clearance Requirement - Top Secret

DUTIES:

  • Provide at least monthly briefings to branch leadership on the status of all open requirements for OCO mission systems
  • Monitor performance of OCO mission systems and operations crews and identify positive/negative trends and the ability of current systems to meet mission needs.
  • Identify, deficiencies impacting operations or system performance.
  • Prepare briefings, position papers, background papers, talking papers, and other products for government employees to use in advocating solutions to operational requirements or mission system and/or crew deficiencies.
  • Capture, clarify, validate, and ensure completeness of OCO mission system requirements for delivery to A5/2K for solution resourcing.
  • As part of the OCO Weapon System Team track and attend A5/2K meetings, working groups, etc., in which OCO mission systems require representation and ensure system development efforts meet requirements, fielding is synchronized with operational tempo, receiving units are postured to incorporate and employ new capabilities as efficiently as possible, and the formal training unit is postured and resources to implement initial qualification training on new capabilities.
  • Coordinate on the sufficiency of operational test activities supporting the fielding of new systems or modifications/upgrades to existing systems. Make recommendations to branch leadership to improve testing where planned, or on going testing, is insufficient to assess whether or not the performance of a system meets operational requirements. Monitor developmental testing and operational testing activities in close coordination with A5/2K, the PMO, and testing squadrons.
  • Coordinate on, and make recommendations to leadership, on whether or not to accept a fielding recommendation based on the results of completed testing.
  • Create Integrated Master Schedules through creating project schedules for work that must be done to organize forces, develop and implement training for them, and present them and merging them with those of a program office developing the capability(ies) those forces with receive and be trained to employ. If the program office does not produce a delivery schedule, coordinate to capture relevant development tasks for documentation on the IMS.
  • Provide periodic, as determined by leadership, updates on the status of work specified in each IMS for each capability development effort.

Qualifications:

  • Must have current TS/SCI eligibility.
  • Bachelors degree in computer science, computer engineering, or cybersecurity, OR 5 years experience conducting penetration testing against commercial or government entities OR 5 years offensive cyberspace operations experience in the military. Masters degree in one of the above listed programs preferred.
  • Minimum of two (2) years' experience with Air Force NAF, MAJCOM, HAF, USCYBERCOM, and/or joint staff functions. Preferably within the J/A3 or J/A5 directorate.
  • Working knowledge of Project Management either in government or corporatesettings.
  • Experience and working knowledge of Department of Defense
  • Ability in Atlassian products such as Confluence and JIRA
  • Knowledge of United States Government (USG) program requirements principles,directives, methodologies, and approaches used in developing, managing, conducting,and tracking system requirements and policy and guidance.
  • Knowledge of United States Government (USG) cyberspace training principles, directives, methodologies, and approaches used in developing, managing, andconducting training programs and events.
  • Knowledge agile IT system development principles and methodologies, to include but not limited to the Scaled Agile Framework
  • Understand how operational offensive cyber missions are planned and executed across each mission system.
  • Knowledge of MITRE ATT&CK or similar hacking methodologies framework
  • Be able to articulate the process used to execute initial access operations to gain entry into computer and network systems both remote and locally. To include but not limited to remote techniques such as Man-on-the-Side, Man-in-the-Middle, and target-triggered (e.g. phishing).
  • Articulate processes hacker use to execute code and run commands on target systems environments, paired with tactics, techniques, and procedures tactics to steal data, affect data or systems, and maneuver through a network
  • Describe various process for maintaining persistence within a network
  • Articulate privilege escalation tactics, techniques and procedures
  • Understand and be able to discuss concepts for evading network defenses to include, but not limited to evading endpoint security software, Windows and common Linux operating system security features, logging (local and remote), network detection and prevention systems, web proxies, and e-mail gateways.
  • Be able to discuss harvesting and cracking various types of credentials
  • Understand how hackers conduct reconnaissance of target networks for initial access planning and lateral movement within a network
  • Articulate tactics, techniques and procedures for lateral movement in a network.
  • Describe TTPs hackers use to remain anonymous if their activity is detected.
  • Understand and describe a broad level of command and control techniques used to operate malicious software embedded in targeted networks and systems.
  • Describe tactics, techniques and procedure for exfiltrating data from a network.
  • Be able to apply knowledge of gaining and maintaining unauthorized and unnoticed access to computer systems, networks and systems attached to them to assist in the development, maintenance, and execution of training programs and systems used to train operations crews to conduct those activities from fielded mission systems to a specified level of proficiency.
THE KENJYA-TRUSANT GROUP, LLC is a Service-Disabled Veteran-Owned Small Business that was established in 2015 as a merger between The Kenjya Group, Inc. and Trusant Technologies, LLC. Our mission is to implement, support and protect the nations advanced technology systems, business processes and high-technology facilities. Working with the Department of Defense, Department of Homeland Security, the Intelligence Community, state and local governments, and commercial clients, Kenjya-Trusant provides cyber protection, information technology, engineering, construction management and acquisition support services. We are a small company with big company benefits, including Health, Dental, Vision, 401K, Bonus Potential, Flexible Spending Account, Life Insurance, Short- and Long-Term Disability, Paid Time Off, and a culture of teamwork and continuous learning. Come grow with us!
icon no score

See how you match
to the job

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Cyber Security And Defense Weapon System Management
New!

The Kenjya-Trusant Group, LLC

Posted Today

VIEW JOBS 9/26/2022 12:00:00 AM 2022-12-25T00:00 Kenjya-Trusant is seeking Cyber Security and Defense Weapon System Management to Headquarters Air Combat Command (HQ ACC) at Langley Air Force Base, Virginia. Support includes a full range of Information Warfare training and operations, Information Systems & Operations, Communications, Administrative Support, and Knowledge Based Services across the air, space, and cyber domains. <strong>Clearance Requirement - Top Secret </strong><p><strong>DUTIES:</strong></p><section id="st-jobDescription"><ul><li style="padding: 0; margin: 0;">Identify and coordinate weapon systems requirements with responsible MAJCOM Staffs.  Monitor performance of Cyber Security & Defense weapons systems to identify positive/negative trends and the ability of current systems to meet mission needs.  Resolve deficiencies impacting operations or system performance.  Recommend operational requirements for DCO weapons system sustainment activities and future acquisitions.</li><li style="padding: 0; margin: 0;">Interface with the A5K Weapon system team to identify, deliver, and liaise weapon system priorities, requirements, training requirements, policy, and guidance.  Track and attend A5K meetings, working groups, etc. to represent cyber weapon system interests and priorities. Provide feedback from any meetings to branch leadership within 3 duty days of the event, with at least monthly status updates on enduring activities</li><li style="padding: 0; margin: 0;">Oversee the organization and training of cyber security and defense forces per ACCI 17-202 volumes 1-3, ACCMAN 17-2 volumes 1-3, and ACCI 11-201 & 11-202.  Manage Organizational Change Requests (OCR) and validate organizational structures to ensure effective and efficient mission execution.  Monitor training policies and guidelines to ensure proper implementation across cyber security and defense units and identify gaps in policy delivered monthly.</li><li style="padding: 0; margin: 0;">Establish, manage, and lead CVA/H weapon system working groups on a recurring basis with monthly meetings as a minimum.  Develop agenda and focused topics for each meeting to ensure communication of MAJCOM priorities to the field as well as receive issues from the field.  Take meeting notes and distribute following al sessions.</li><li style="padding: 0; margin: 0;">Oversee all phases of CVA/H testing with A5K, the PMO, and testing squadrons per ACCI 99-101.  Ensures testing meets the requirements to deliver a fully tested and stable system by developing testing criteria to ensure the delivered solution fulfills the requirement.  Ensure all testing deficiencies are captured and presented to the Deficiency Review Board (DRB).  Recommends processes and procedures to streamlines testing while ensuring system stability.</li><li style="padding: 0; margin: 0;">Validate units employing cyber weapon systems are following Stan/Eval requirements to certify CMR/MR operators.  Conduct SAVs with Groups/Squadrons on a rotational basis to review documentation and unit structure for completing evaluations.  Highlight challenges and develop solutions to ensure the accomplishment of the Stan/Eval program.</li><li style="padding: 0; margin: 0;">Advise and assist with on operational acceptance of new or modified cyber weapon systems as new baselines are developed and proceed through testing.  Monitor system tests, evaluations, and reports to ensure fielded capabilities meet operational requirements.  Validate weapon systems meets all requirements and orchestrate operational acceptance package for appropriate A3 approval.  Provide approval recommendations to ACC A5/8/9 for declaration of IOC and FOC for appropriate weapon systems and capabilities.</li></ul></section><section id="st-qualifications"><p><strong>Qualifications:</strong></p><ul><li style="padding: 0; margin: 0;">Must have current TS/SCI eligibility.</li><li style="padding: 0; margin: 0;">Experience in Program Management either in government or corporate settings.</li><li style="padding: 0; margin: 0;">Knowledge of USG Standardization/Evaluation principles, directives, methodologies, and approaches used in developing, managing, and conducting Stan/Eval policy and guidance.</li><li style="padding: 0; margin: 0;">Knowledge of USG program requirements principles, directives, methodologies, and approaches used in developing, managing, conducting, and tracking system requirements and policy and guidance.</li><li style="padding: 0; margin: 0;">Knowledge of USG cyberspace training principles, directives, methodologies, and approaches used in developing, managing, and conducting training programs and events.</li><li style="padding: 0; margin: 0;">Knowledge of USG weapon system testing principles, directives, methodologies, and approaches used in developing, managing, and conducting various testing events.</li><li style="padding: 0; margin: 0;">Minimum of five (5) years' experience with Defensive Cyberspace Operations experience in government or corporate setting.</li><li style="padding: 0; margin: 0;">Minimum of four (4) years' experience developing USG system requirements policy and guidance or managing system requirement process.</li><li style="padding: 0; margin: 0;">Minimum of four (4) years' experience with USG policy development</li></ul><em>THE KENJYA-TRUSANT GROUP, LLC is a Service-Disabled Veteran-Owned Small Business that was established in 2015 as a merger between The Kenjya Group, Inc. and Trusant Technologies, LLC. Our mission is to implement, support and protect the nation’s advanced technology systems, business processes and high-technology facilities. Working with the Department of Defense, Department of Homeland Security, the Intelligence Community, state and local governments, and commercial clients, Kenjya-Trusant provides cyber protection, information technology, engineering, construction management and acquisition support services. We are a small company with big company benefits, including Health, Dental, Vision, 401K, Bonus Potential, Flexible Spending Account, Life Insurance, Short- and Long-Term Disability, Paid Time Off, and a culture of teamwork and continuous learning. Come grow with us!</em></section> The Kenjya-Trusant Group, LLC Hampton Virginia

Offensive Cyber Weapon System Manager

The Kenjya-Trusant Group, LLC