Weapons and Tactics Operator
Tiffany -Jehl
- Scott Air Force Base, IL, United States
Weapons and Tactics Operator
Job Location: Scott AFB
Clearance Required:
Degree and Years of Experience:
- Three (3) or more years’ experience in cyber security required
Required Certifications:
- DoD 8570.01-M IAT Level III certification (current)
Have a Bachelor Degree or possess, or be willing to obtain, one of the following certifications: CFR, Cloud+, CySA+, GCED, or PenTest+.
Required Skills:
- Experience on the Cyberspace Vulnerability Assessment / Hunter (CVA/H) weapon system or similar cyber weapon system
- Experience with toolsets such as Wireshark, the Elastic Stack, Arkime, Zeek, Metasploit, tcpdump, NMap, Nessus, Snort, EnCase, Forensic Toolkit, Windows Fundamentals, UNIX fundamentals, exploitation theory, privilege escalation, evidence removal
- Have strong UNIX/Linux fundamentals along with familiarity of UNIX/Linux/Windows Command Line Interface (CLI), Bash and PowerShell
- Proficient in writing, editing, executing scripts on Windows, Linux, UNIX systems
- Experience with encrypted and unencrypted remote access technologies, such as RDP, SSH, VPN, Telnet, and FTP
- General knowledge of cyber security frameworks, such as the Cyber Kill Chain, MITRE ATT&CK, and the NIST 800 series
- General knowledge of physical computer components and architectures, including the functions of computer domains, directory services, various components and peripherals, basic programming concepts, assembly codes, TCP/IP, OSI models, underlying networking protocols (e.g., DNS, ARP, etc.), security hardware and software
- Candidate must be self-motivated and able to perform with little to no supervision
Preferred Skills/ Qualifications:
- Experience working in a Weapons and Tactics shop/office
- Experience in the development of Tactics, Techniques, and Procedures (TTP)
- Experience in the development of training material
- Knowledge of cyber forensic collection, preservation, and chain of custody
- Experience with Endpoint Detection and Response (EDR) toolsets, such as Elastic Endpoint Security, CrowdStrike Falcon, and Trellix EDR
- Experience with encryption, decryption, and hashing technologies such as DES, AES, RSA, PKI, SHA, and MD5
- Knowledge of Red Team Tactics, Techniques, and Procedures (TTP)
- Knowledge of distributed systems, process control, advanced routing, wireless, cloud, telecom and datacom platforms
- Experience programming in C, C++, C#, Ruby, Perl, Python, SQL
Additional Requirements:
- Travel may be required up to 25%
- Must successfully complete, and maintain, mission qualification requirements
Posted On: Monday, September 9, 2024