TJ Recruiting

Weapons and Tactics Operator

Tiffany -Jehl - Scott Air Force Base, IL, United States

Weapons and Tactics Operator

Job Location: Scott AFB

Clearance Required:

  • TS/SCI

Degree and Years of Experience:

  • Three (3) or more years’ experience in cyber security required

Required Certifications:

  • DoD 8570.01-M IAT Level III certification (current)

Have a Bachelor Degree or possess, or be willing to obtain, one of the following certifications: CFR, Cloud+, CySA+, GCED, or PenTest+.

Required Skills:

  • Experience on the Cyberspace Vulnerability Assessment / Hunter (CVA/H) weapon system or similar cyber weapon system
  • Experience with toolsets such as Wireshark, the Elastic Stack, Arkime, Zeek, Metasploit, tcpdump, NMap, Nessus, Snort, EnCase, Forensic Toolkit, Windows Fundamentals, UNIX fundamentals, exploitation theory, privilege escalation, evidence removal
  • Have strong UNIX/Linux fundamentals along with familiarity of UNIX/Linux/Windows Command Line Interface (CLI), Bash and PowerShell
  • Proficient in writing, editing, executing scripts on Windows, Linux, UNIX systems
  • Experience with encrypted and unencrypted remote access technologies, such as RDP, SSH, VPN, Telnet, and FTP
  • General knowledge of cyber security frameworks, such as the Cyber Kill Chain, MITRE ATT&CK, and the NIST 800 series
  • General knowledge of physical computer components and architectures, including the functions of computer domains, directory services, various components and peripherals, basic programming concepts, assembly codes, TCP/IP, OSI models, underlying networking protocols (e.g., DNS, ARP, etc.), security hardware and software
  • Candidate must be self-motivated and able to perform with little to no supervision

Preferred Skills/ Qualifications:

  • Experience working in a Weapons and Tactics shop/office
  • Experience in the development of Tactics, Techniques, and Procedures (TTP)
  • Experience in the development of training material
  • Knowledge of cyber forensic collection, preservation, and chain of custody
  • Experience with Endpoint Detection and Response (EDR) toolsets, such as Elastic Endpoint Security, CrowdStrike Falcon, and Trellix EDR
  • Experience with encryption, decryption, and hashing technologies such as DES, AES, RSA, PKI, SHA, and MD5
  • Knowledge of Red Team Tactics, Techniques, and Procedures (TTP)
  • Knowledge of distributed systems, process control, advanced routing, wireless, cloud, telecom and datacom platforms
  • Experience programming in C, C++, C#, Ruby, Perl, Python, SQL

Additional Requirements:

  • Travel may be required up to 25%
  • Must successfully complete, and maintain, mission qualification requirements


Posted On: Monday, September 9, 2024



Apply to this job