Credence LLC Defensive Cyberspace Operations Lead in Fort Gordon, Georgia
Credence Management Solutions, LLC (Credence) is seeking a Defensive Cyberspace Operator who will Apply comprehensive DCO technical, operational, and policy expertise to the development of concepts and identifies capability needs that are the foundation for the implementation of JCIDS. Participates in the development of Joint, DOD, and Army concepts that included aspects of DCO and leverages them in the development of Army capabilities, with focus on the visualization of future operations. Provide comprehensive expertise in defensive cyberspace operations, research and analysis, as well as, capability requirements development; knowledgeable in all areas of Cyberspace Operations as it relates to defensive cyberspace operations and a strong knowledge in emerging technologies such as unified communications, mobile, cloud and virtualization technologies.
Analyzes approved concepts and doctrine for the purpose of developing Army DCO related universal tasks and determining DCO capability gaps.
Develops opportunity statements that drive technology evaluations and assessments; and participates in the development of broad based announcements to solicit proposals from outside groups for certain DCO research and development efforts.
Conducts research and analysis across multiple sources in order to establish the foundation for required DCO capability and architecture development, identify capability gaps, and generate DOTMLPF-P solutions such as doctrine (principles and tactics, techniques, and procedures (TTPs)) development, organizational design changes, training initiatives, materiel solutions, leadership and education requirements, personnel solutions, and facilities renovation and design.
Participates in capability needs analyses (CNA) to assess the Army's ability to perform future DCO missions as defined by joint and Army concepts taking into account existing and programmed solutions. Identifies baseline joint and Army DCO capabilities; assesses and recommends priorities for capabilities based upon risk to mission success if not performed; assesses accommodation of DCO capabilities given programmed DOTMLPF-P solutions resourced over the budget years; assesses and recommends priorities for DOTMLPF-P solutions; and identifies, assesses, and recommends for priorities for macro-level gaps given the current level of funding. Coordinates results of analyses that support recommendations to key stakeholders and senior leadership.
Produces conceptual products that require assessments which include studies, experimentation, wargaming, analyses, testing and simulations in order to determine what DOTMLPF solution sets are necessary to gain the specific capabilities required for the future force.
Plans, prepares, executes, and leads action officer and senior-level conferences, meetings, workshops, and reviews in support of ongoing programs/projects related to TCM-Cyber roles and responsibilities for developing capabilities for the Cyber Mission Force and overall cyberspace workforce. Present TCM Cyber positions at conferences, boards, committees, panels, working groups, reviews and other forums as deemed appropriate.
Develops information materials, provides analysis and presentations in support of all DCO capability development efforts. Serves as a subject matter expert for integrating DCO concepts into Army Warfighting Requirements. Collaborates with proponent sponsors and HQDA, ARCYBER, FORSCOM, USCYBERCOM, Joint Staff, and Combatant Commands for DCO capability development.
Conducts comprehensive analysis to ensure that the integration of doctrine, organization, training, materiel, leadership and education, personnel, facilities and policy (DOTMLPF-P) factors are adequate to support current and emerging warfighting systems. Analyze changes in joint and other services’ cyberspace/electronic warfare and related doctrine and techniques to determine impact on Army operational capabilities. Coordinates analysis results that support recommendations with key stakeholders and presents findings to TCM Cyber.
Collaborates with the Science & Technology (S&T) community to assist in developing the Army Science and Technology Master Plan. Army technology objectives identified in the Army Science and Technology Master Plan provide the basis for the construct of advanced technology demonstrations. Works S&T community to develop and demonstrate a new DCO capability that does not exist though such methods as prototyping. Moreover, works with industry, academia, and/or the S&T community to accelerate the maturation of advanced technologies, assists in providing cost data for possible solutions and insight into non-materiel implications. Writes documents for requirements needs from the field on a collegiate level.
One of the following certifications is required: Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH) or GIAC Penetration Tester (GPEN).
A minimum of five (5) years’ experience in information technology and computer networking with three (3) years’ experience in defensive cyberspace operations, demonstrates experience and knowledge in leading small teams and experience/knowledge of Army force modernization, capability development process, or requirements determination process.
A certification in Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM) is required
Must possess a strong knowledge of DCO concepts, tactics, techniques, procedures, and technologies (such as cyberspace analytics (big data), user activity monitoring, forensics and malware analysis, various DCO related tools, and cloud and virtualization solutions).
Must be knowledgeable in cyberspace doctrine, policy, and regulations; and demonstrate the ability to search for, find, and comprehend applicable doctrine, policies, regulations, and requirements in order to generate recommendations for future DCO capability development efforts (e.g. requirements generation, evaluations, assessments, capability drops, and experimentation).
Knowledge of commercial telecommunications technologies and methodologies, DoD and/or Army cyberspace operations, academic hypotheses/thesis related to cyberspace security, industry best business practices related to cybersecurity, and cloud computing/virtualization. Knowledge of cyber threats impacting DoD, national, and Army networks and associated systems, including specific threat TTPs.
Minimum Education: Education qualifications shall include, at minimum a bachelor degree. Degree will have a focus in computer science, information technology, information systems management or computer programing.
Security Clearance: Must possess a Top-Secret security clearance and upon award be immediately eligible for
nomination to receive Special Compartmented Information (SCI) access.
Credence Management Solutions, LLC is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity or national origin.
Requisition ID: Cyber Army.2