Cyber Operator
CNF Technologies, Scott Air Force Base, IL, United States
CNF Technologies is currently looking to hire a Cyber Operator on a full time, permanent basis. This opportunity must be performed onsite at either Lackland AFB in San Antonio, TX or Scott AFB in Belleville, IL. An active TS/SCI security clearance (minimum) is required.
Title
- Cyber Operator
Location
- Lackland AFB in San Antonio, TX – OR – Scott AFB in Belleville, IL
Summary:
Serve on a Cyber Protection Team (CPT) in either a Cyber Security Network Analyst position or Cyber Security Host Analyst position. The operator will conduct cyber threat hunting, network navigation, tactical forensic analysis, forensic collection of digital artifacts and other valuable operational data, and when directed, execute operations in support of defensive initiatives. Operators will provide support for persistent monitoring of all designated networks, enclaves, and systems. Candidate may be required to interpret, analyze, and document findings in reports in accordance with computer network directives, including initiating, responding, and reporting discovered events. Candidates may be required to manage and execute first-level responses and address reported or detected incidents.
Required Certifications:
- DoD 8570 IAT Level III certification (current)
- Possess, or be willing to obtain within 6-months of start date, an additional certification related to your specific role (Host or Network):
**Host – Operating system certification (i.e., Linux+, Windows Server, GCIH, etc.)
**Network – Network related certification (i.e., Network+, CCNA, GCIH, etc.)
Required Qualifications:
- Three or more years’ experience in cyber security required
- Active TS/SCI security clearance required
- Experience with toolsets such as the Elastic Stack, Arkime, Zeek, Wireshark, Metasploit, tcpdump, NMap, Nessus, Snort, EnCase, and Forensic Toolkit
- Strong knowledge of Windows Fundamentals, UNIX/Linux fundamentals, and adversary Tactics, Techniques, and Procedures (TTPs), such as initial access, credential access, privilege escalation, persistence, lateral movement, and exfiltration
- Experience with scripting and Command Line tools, such as UNIX/Linux Bash, Windows Command Line Interface (CLI), PowerShell, and Python
- Proficient in writing, editing, executing scripts on Windows, UNIX/Linux systems
- Experience with encrypted and unencrypted remote access technologies, such as RDP, SSH, VPN, Telnet, and FTP
- General knowledge of cyber security frameworks, such as the Cyber Kill Chain, MITRE ATT&CK, and the NIST 800 series
- General knowledge of physical computer components and architectures, including the functions of computer domains, directory services, various components and peripherals, basic programming concepts, assembly codes, TCP/IP, OSI models, underlying networking protocols (e.g., DNS, ARP, etc.), security hardware and software
- Proficient in collecting and analyzing digital data, recording detailed notes, and documenting findings in reports
- Candidate must be self-motivated and able to perform with minimal supervision
Preferred Qualifications:
- Knowledge of cyber forensic collection, preservation, and chain of custody
- Experience with Endpoint Detection and Response (EDR) toolsets, such as Elastic Endpoint Security, Endgame, CrowdStrike Falcon, and Trellix EDR
- Experience with encryption, decryption, and hashing technologies such as DES, AES, RSA, PKI, SHA, and MD5
- Knowledge of Red Team Tactics, Techniques, and Procedures (TTP)
- Knowledge of distributed systems, process control, advanced routing, wireless, cloud, telecom and datacom platforms
- Knowledge of virtualization concepts, technologies and tools, such as VMware/Virtual Box, Docker, Kubernetes, and Ceph
- Familiarity with Cloud Computing concepts, technologies, and tools, such as AWS, Azure, and Google Cloud
- Experience programming in C, C++, C#, Ruby, Perl, Python, SQL
Additional Requirements:
- Travel may be required up to 25%
- Must successfully complete, and maintain, mission qualification requirements