What are the responsibilities and job description for the Cyber Exercise SME Trainers (1099) position at MKS2 Technologies?
Cyber Exercise SME Trainers (1099)
MKS2 is seeking trainers to support military exercises focused on Operations in the Information Environment and Cyber Domain. Tasks will include but are not limited to the analysis and research of open source/publicly available information (PAI) requirements through the identification, collection, and aggregation of media, social media, imagery, or other publicly available information as it pertains to Multi-Domain Operations. Tasks will include but are not limited the design and building of complex cyber training scenarios based on publicly available reporting and professional expertise.
Trainers may live anywhere in the US, as travel to and accommodation at training locations is provided for the assignment period (typically 1-4 weeks). Trainers must have a newer laptop and high-speed internet access in order to provide remote support when not traveling. Trainers will utilize their expertise to develop, plan, coordinate, synchronize, and integrate scenarios with US Military and other agencies/organizations to simulate/replicate Operations in the Cyber Environment. Work may include, but is not limited to classroom instruction, coaching, roleplaying, scenario scripting and development, participation in field exercises, replication of social media and/or operational cyber environment, and providing subject matter expertise in offensive and defensive cyber operations.
Responsibilities:
- Maintains current knowledge of relevant technologies and subject areas.
- Display subject matter expertise in the following SOF, Cyber, Intel, or Electronic Warfare and its’ relevance to Multi-Domain Operations and / or Operations in the Information Environment.
- Design and develop dynamic and responsive computer networks that provide an environment to train individuals and groups on established penetration testing and incident response methodologies and tools.
- Research and implement threat emulation relevant to changing scenarios.
- implement variety of technologies to include DNS, TOR, windows and UNIX workstations and servers, routing and firewall devices, and traffic generation software.
- Prepare reports, briefs, and documents to support event scenario development.
- Oversee OPFOR (red) and population (grey) activity in exercise networks, ensuring MSEL/scenario development is accurately portrayed in network traffic.
- Understand and demonstrate the TTP’s and concepts in both Defensive Cyber Operations and Offensive Cyber Operations.
- Plan and create visual information products that communicate assigned training networks, scenarios, and objectives to inform OPSGRP and the training audience.
- Gather open-source and controlled intelligence to develop a predictive understanding of adversarial strategies, priorities, and overlapping interests.
- Facilitate interaction to identify opportunities for collaboration and sharing.
- Create PowerPoint presentations and marketing material to articulate program.
Required Qualifications:
- Active Secret clearance.
- Four (4) years demonstrated experience in an intelligence discipline or PSYOP working in the DoD or IC within the last 7 years, or two (2) years demonstrated experience working in a field related to OSINT research, collection management, or analysis or the exploitation of publicly available information or social media.
- Experience with scripting languages (e. g., Python, PowerShell, Java, Perl, etc).
- At least 3 years of experience directly related to Red Team assessments or penetration testing (intranet, internet, web, wireless, and social engineering).
- Successful communication with management personnel, technical personnel and third parties.
Preferred Qualifications:
- BA/BS degree from an accredited college; preferred degree in Information Technology or Information Security field.
- Active Top Secret Clearance.
- Special Operations experience.
- Familiarity with Direct Action, Counterterrorism, Unconventional Warfare, Foreign Internal Defense, Psychological Operations, Civil Affairs and Special Operations Intelligence.
- Hold one of the following certifications: OSCP, OSWP, GPEN, GWAPT, OSCE, OSEE, GXPN.
- Experience with vulnerability management, which includes reviewing cyber security vulnerabilities for risk and relevance and planning mitigations for systems vulnerabilities.
Computer Skills:
- Advanced knowledge of Microsoft Office tools (Word, Excel, and PowerPoint).
- Advanced knowledge of computer networking.