user avatar

Cyber Security Evaluation Team (CSET) Member

Command Post Technologies, Inc.

Posted yesterday

Job Requirements

Patuxent River, MD
Top Secret/SCI Polygraph Unspecified
Senior Level Career (10+ yrs experience)
Salary not specified
Join Premium to unlock estimated salaries

Job Description



Command Post Technologies is seeking a Cyber Security Evaluation Team (CSET) Member to support the Department of Defense (DoD) National Cyber Range Complex (NCRC).

The National Cyber Range Complex provides training support, cyber risk assessments, and cyber testing. It enables cyber forces to train as they fight as well as support to program offices with closed-loop systems of systems to safely and securely assess vulnerabilities and impacts to mission.

The range is an operationally representative networked environment with reconfigurable architecture at various classification levels. The facility features radio frequency enabled communications devices and hardware-in-the-loop system components for highly scalable red, blue, and gray commercial as well as government environments. The team can also support cyber table tops featuring opposing forces and post event analysis. 

This facility supports the mission to provide realistic cybersecurity environments for test and evaluation of major DoD acquisition programs and to enable the conduct of realistic training and certification events for the DoD Cyber Mission Force. The NCRC facility may also support non-DoD customers such as Department of Homeland Security (DHS), industry, academia, and international partners.

The successful candidate will serve on-site at the Patuxent River, Maryland site.  This position currently requires an on-site schedule with 5 days on-site. Position may require flexible weekend and/or evening shift work, as needed. Schedule is subject to change based on company/contract requirements.

Key Responsibilities
  • Working closely with our government customer, perform adversarial threat emulation (Red Teaming) and penetration testing to assess the performance of aeronautical systems, subsystems, and equipment (platform IT). 
  • Working closely with our government customer, perform adversarial threat emulation (Red Teaming) and penetration testing assessments on government networks including Windows domains, Linux systems, switches, routers, and other connected network devices. 
  • Apply and/or develop highly advanced principles, concepts, and tactics for penetration testing. ? 
  • Identify issues and vulnerabilities associated with operational networks and programs. 

Travel 

Up to 10% of the time to CONUS sites as required. 

Requirements


  • All applicants for this position must hold a current Top-Secret clearance with the ability to obtain and maintain SCI eligibility  
  • Bachelor’s degree from an accredited college in a related discipline, or equivalent experience/combined education and/or advanced certification. 
  • At least 10 years of pen testing, red team operations, and/or offensive security experience including experience conducting on-net assessments 
  • Experience operating open source and commercial tools such as Metasploit, Burp Suite, Cobalt Strike, NMAP, Core Impact, etc. 
  • Working knowledge of IP network protocols, subnetting, routing, switching, etc.
  • Experience in one or more of the following cybersecurity disciplines: 
    • Penetration testing of modern Windows and Linux operating systems and IP-based networks 
    • Exploit and malware development targeting modern operating systems and defenses  
    • Reverse engineering
    • Web application penetration testing 
    • Software development 
    • Hardware hacking 
    • Cryptography 
    • Software defined networks 
    • Digital forensics 
    • Control systems 
    • Radio Frequency (RF) 
  • Ability to work in a diverse team environment 
  • Industry certification of EC-Council Certified Ethical Hacker (C|EH) and ISC2 Certified Information Systems Security Professional (CISSP) or their equivalents are required 
  • Be able to obtain one or more of the following vendor certifications within 6 months of being hired:  
    • Offensive Security Certified Engineer (OSCE) 
    • Offensive Security Certified Professional (OSCP) 
    • GIAC Certified Exploit Researcher and Advanced Penetration Testers (GXPN) 

Desired Qualifications
  • Cyber related military training courses such as Title 10 Interactive On-Net Operator Course, Joint Cyber Analysis Course (JCAC), and Cyber Operations Specialist Qualification Course
  • Industry certification of Offensive Security Certified Professional (OSCP) is highly desirable
  • Specialization in web application penetration testing is a plus
  • Experience with WiFi and/or Software Defined Radio (SDR) hacking is a plus
  • Experience with red team / adversarial emulations is a plus 
  • Experience executing Close Access Team (CAT) assessments is a plus 
  • Experience with weapon systems assessments is a major plus 
  • Experience with bash scripting, Python, and/or PowerShell is a major plus 
  • Experience working in a cyber range is a major plus 


About us: We are Command Post Technologies, Inc. (CPT). CPT is a Service-Disabled, Veteran-Owned Small Business (SDVOSB), providing engineering services in the areas of Cyber Security, Software Development, Test & Evaluation, and Strategic Planning. CPT employees appreciate working in a caring environment that promotes a healthy work-life balance. As individuals, we come together as a team, supporting a culture rooted in our core principles of integrity, determination, and innovation. In all of CPT’s collaboration efforts, our team prioritizes communication, accountability, and being resourceful in order to maximize efficiency and results.

What’s In It for You 
  • Great health benefits (for more info contact us directly)
  • Leadership training
  • 401k with generous company matching 
  • Employee Stock Ownership Plan (ESOP)
  • Career professional development
  • Tuition reimbursement
  • Flexible hours
  • Work/Life balance
  • Rewards and recognition
  • Paid Time Off
  • Parental Leave

Command Post Technologies, Inc. (CPT) is a Service-Disabled Veteran-Owned Small Business (SDVOSB) founded in 2008 and headquartered in Suffolk, VA with personnel in various states including Virginia, Maryland, Florida, and Texas. With 2/3 of our staff being former military, CPT firmly believes in employing veterans. Command Post Technologies, Inc. is a unique provider of innovative solutions that enhance our corporate clients’ productivity and empower our government clients with the ability to protect against all enemies: foreign and domestic. CPT adapts its successful military experiential approach to the needs of leaders in a global business environment and provides an elite leadership curriculum that results in a world-class, leadership-altering event.

Command Post Technologies Inc. (CPT) is an Equal Employment Opportunity and Affirmative Action employer. We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identify, gender expression, sex, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state, or local law. We take Affirmative Action to ensure equal opportunities for employees and potential employees without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sex, sexual orientation, marital status, veteran status, disability genetic information, citizenship status, or membership in any other group protected by federal, state, or local law. 

We abide by the Pay Transparency Nondiscrimination Provision and will refrain from discharging or otherwise discriminating against employees or applicants who inquire about, discuss, or disclose their compensation or the compensation of other employees or applicants. An exception exists where the employee or applicant makes the disclosure based on information obtained while performing his or her essential job functions.
group id: 10443519