Description & Requirements
Are you interested in detecting internal and external threats? Do you have the ability to protect and defend the most coveted targets in the world to ensure the safety of information systems assets, and protect systems from intentional or inadvertent access or destruction? ManTech International Corporation is seeking individuals who are interested in joining our team and helping protect our national security, while working on innovative projects that offer opportunities for advancement.
ManTech is looking for a highly motivated and qualified CNO Operational Technology SME in San Antonio, TX. This rewarding and challenging position supports the Department of Defense (DoD) to produce a wide range of capabilities to improve cyberspace operations and defend U.S. vital national security interests.
Responsibilities:
Developing Operational Technology (OT) and Industrial Control Systems (ICS), defensive capabilities that function within a platform, focusing on detection rules for ICS protocols for use in network traffic analysis.
Assist in the design and creation of an in-house ICS range to assess prototype effectiveness.
Research and identify threats to PLCs, OT/ICS systems, and critical infrastructures.
Virtualizing critical infrastructure environments and components to model actual / simulated environments.
Document assumptions, findings, and recommendations of research and prototype evaluation.
Analyze solutions employing data communications and automation protocols such as BacNet, ModBus, CIP, EnIP, etc.
Collaborate with product vendors and communicate the customer’s requirements.
Build defensive rules and scripts for Suricata, Zeek, and Arkime.
Build and support Python libraries for PCAP manipulation.
Knowledge of test-driven development to test both PCAP manipulation and rules and scripts to ensure their quality using pytest and robot.
Basic Qualifications:
Comprehensive understanding of OT/ICS demonstrated through hands-on experience implementing OT/ICS in the field, as well as engineering and development expertise in crafting, creating, configuring, and validating ICS systems and devices essential for critical infrastructures.
Experience (3+ yrs.) developing software programming languages such as Python, Lus, and other scripting languages.
Operational experience with OT/ICS in power, water, fuel, HVAC, manufacturing, and other critical infrastructures.
Able to work effectively in a collaborative environment using physical and virtual devices and network architectures to research, develop, and test solutions.
Understanding and decomposition of Purdue reference architecture, ISA-99, and IEC-62443.
Experience developing solutions integrating and extending open source/GOTS/COTS applications.
Familiarity with database and data storage technologies, such as ElasticSearch, MongoDB, PostgreSQL.
Knowledge of DevSecOps technologies (GitLab, Ansible, Helm, Nexus, Grafana, etc.).
Demonstrated experience with source control and code repository tools.
Experience working with GitHub and GitLab and Confluence in an agile team environment.
Working knowledge of network engineering concepts including network devices, traffic flow, and approaches to provide defense-in-depth.
Preferred Qualifications:
Kubernetes and/or AWS certification.
Familiarity with network security technologies such as Suricata, Arkime, Zeek, and other open-source capabilities.
Familiarity with SIEM and SOAR technologies such as Elastic SIEM, Splunk, XSOAR.
Familiarity with Artificial Intelligence/Machine Learning concepts and Intelligent Decision Automation Platforms.
Familiarity with DoD Enterprise DevSecOps Reference Design.
Knowledge of test-driven development tools.
Security clearance requirement:
TS/SCI-eligible
Physical requirements:
Must be able to be in a stationary position more than 50% of the time.
Must be able to communicate, converse, and exchange information with peers and senior personnel.
Constantly operates a computer and other office productivity machinery, such as a computer.