Skip to Main Content

Cyber Scenario SME

Reservoir International, LLC
Holly Ridge, NC
  • Expired: February 03, 2023. Applications are no longer accepted.

The Cyber Ops SME will apply a broad comprehension of cyber space operations concepts to create a realistic and robust cyber environment replicating real world capabilities to provide analytical problem sets based on prior coordination with the G-7 Intelligence Officer and G-7 SIGINT Chief. The Cyber Ops SME will participate in pre-exercise/in-progress scenario scripting meetings as part of the Exercise Control Group (ECG) and coordinate all product creation with the G-7 Intelligence Section.

  • Ability to apply understanding of Open-Source Intelligence (OSINT), Space Operations and Electronic Warfare (EW) capabilities to include collections, analysis, and support to lethal and non-lethal targeting.
  • Integrate with the G-7 contracted scenario manager, reports officer, SIGINT analyst, and human terrain SME in order to ensure the cyber environment is fully nested within in the overall exercise scenario target network and supports the URX tactical, strategic, and operational training objectives.
  • Develop training infrastructure to achieve Cyber related JMETL training objectives including coordinating cyber enabling effects with USCYBERCOM/Interagency ISO direct action, advancing IO and cyber capabilities.
  • Coordinate support from throughout the DoD to include Joint Staff J7 and Service Cyber/EW/Space program managers to leverage existing Programs of Record (POR) within the joint force capable of replicating peer capabilities and integrating threat information warfare, GPS jamming, contested /denied communications, EW, and offensive/defensive cyber operations.
  • Assist the G-7 Intelligence section in the creation, operation, and management of multiple social media personas for targetable individuals, create associated personal websites and social media accounts, related on-line information sources, role player scripts actively engaged in cyber space communications (messages, social media posts, location updates), and other realistic cyber exercise injects.
  • Design, install, operate, and maintain cyber target infrastructure and provide detailed documentation and access for each device, platform, account, and persona throughout the planning and execution of the URX.
  • Ensure all cyber accounts/profiles/equipment supporting episodic role players are functional at the start of each event.
  • Responsible for performing work with limited guidance from the G-7 Intelligence Officer and G-7 SIGINT Chief.
  • Responsible for briefing cyber operations plan and exercise development working groups, G-7 synchronization meetings, in-progress and facilitated after actions reviews, distinguished visitors, etc.
  • Submit written after actions review assessments post exercise to G-7 lessons learned analyst.
  • Assist the SIGINT Chief with asset management and inventory of technical equipment related to the execution of URX events.
  • Stay in touch with current and emerging cyber principles and social media platforms. Candidate should be proficient and capable of performing tasks using:
    1. Computer, Networking and Mobile Device (i.e., MS Windows, Apple OS, MS Office suite, Internet browsers, Email, Samsung, iPhone, Open VPN, WiFi and Hotspot connectivity).
    2. Social Media platforms (i.e., Facebook, Twitter, Instagram, TikTok, SnapChat, LinkedIn, etc.)
    3. Marketing techniques specific to Social Media branding and Search Engine Optimization (SEO).
    4. Scheduling tools used to manage Social Media posts.
    5. Website Development and content editing in WordPress (or other design tools).
    6. Creative Writing Skills used in blog content creation/management.
  • Prior experience working as a close-access operator in a real-world operational capacity, conducting cyber/cyber-enabling operations.
  • Minimum three years of military or civilian experience conducting cyber enabling operations or working with a Cyber Mission Force (CMF) (SOCOM, USCYBERCOM, MARFORCYBER, etc.) required.
  • Three years of SMU experience with emphasis on conducting cyber enabling operations desired.
  • Graduate of a relevant/accredited OSINT Certification course desired (Berber Hunter Tool Kit or equivalent).
  • Holds active Ethical Hacker Certification, COMPTIA A+/Net+/Sec+ Certifications, Offensive Security Certification Professional (OSCP).
  • USCYBERCOM Work Role Certification desired.
  • US Citizenship required.
  • Must hold active TS/SCI security clearance.
  • Must have a valid Driver's License.
  • Must possess a thorough understanding of fundamental Cyber, Space, and EW and OSINT Operations., computer network, e-mail server, and VPN operations.
  • Must possess a thorough understanding of offensive cyber operations TTPs required.
  • Possess a thorough understanding of defensive cyber operations TTPs desired
  • Two 45-day travel periods in support of unit readiness exercise (Fall & Spring) for a total of approximately 90 days annually.
  • Additional travel may be required.
Nothing in this job description restricts management's right to assign or reassign duties and responsibilities to this job at any time. This description reflects management's assignment of essential functions; it does not proscribe or restrict the tasks that may be assigned. This job description is subject to change at any time.

Reservoir International is an equal opportunity employer and is committed to equal employment opportunities in recruitment, hiring, promotion, training, compensation and disciplinary action with regard to terms and conditions of employment. Reservoir International does not discriminate on the basis of race, religion, national origin, color, age, sexual orientation, or sex, including pregnancy and childbirth, veteran status or any other legally protected characteristic.

Reservoir International, LLC


Holly Ridge, NC
28445 USA