Cyber Data Fusion Software Development - Baltimore, United States - Silver Bullet Solutions

    Silver Bullet Solutions
    Silver Bullet Solutions Baltimore, United States

    1 month ago

    Default job background
    Description


    CYBONT

    Cyber Ontology and Data Fusion

    Ref ID:

    CYBONT

    Job Title:
    Cyber Data Fusion Software Engineer

    Location:
    DC Metro area, Aberdeen Proving Grounds, MD

    Job Description:
    There is a growing set of data model andschema elements pertaining to cyber operations such as:
    While these are immensely valuable, they havetwo capability gaps.

    The objectiveof this work is the development of a mathematical ontology for cyberevents, entities and their associations and intentions

    cyber SituationAwareness (SA)

    and associated cyber Command and Control (C2) -

    DoDIN

    Ops, Defensive Cyber Operations (DCO), andOffensive Cyber Operations (OCO).

    Where the cyber ontology ( CybOnt ) comes in is with the exchange of detailed andunambiguous

    mathematically structured

    information between the variousnodes, National to and from BCT.


    In the sensor and data fusion world this is called DistributedData Fusion (DDF) and, for the distributed and diverse algorithms toproduce accurate estimates, it is essential that the exchanged data beunambiguous and interoperable.


    Required skills:
    Software engineering in

    DoD

    environment
    Processing of cybersensors data
    Inference, analytics,detection, and/or data fusion algorithms

    Desired skills:
    Knowledge and/orexperience with Tactical Cloud Reference Architecture (TCRI)
    Hypothesis testingalgorithms
    Experience with Armycyber systems such as EW PMT, DCGS-A
    Cyber ranges andsimulators

    Task areas:
    Assist indemonstrating that

    a cyber

    ontology can aid inthe detection of attacks.
    Aid in extendingthe current

    CybOnt

    to address the attacksignatures and patterns in sample data using tools like SNORT,

    Wireshark , and Network Miner.
    Populate instancedata into

    CybOnt

    and pass by OWL API via

    OWLLink

    to an open source OWL

    reasoner such as

    FaCT ++,

    JFact , HermiT , Pellet, and

    RacerPro to entail

    typeInstance

    relationships betweenthe A-box instance data and the T-Box H1 and H0 patterns.
    Develop use casesfor cyber scenarios and vignettes of interest.

    Then follow a systematic procedure toderive information and cyber ontology requirements from those usecases.
    Leverage existingontology patterns and the Cyber Schema data elements.

    First assemble the ontology patternsthat cover the use case information requirements.

    Then identify data model and schemaelements that are relevant to the use case information requirements.

    Next rationally reconstruct them intothe formal

    ontologic

    structure.

    From an ontological viewpoint, aninteresting starting point for OCO might be to just reverse engineer themore well-developed DCO

    ontologies , and applytheir inverse.
    Generalize andtrace-to sample and simulated cyber sensor data to ontology elements.
    Ingest the relevant Cyber data (e.g., DARPA PLAN X and XDATA, TWITTER,GPS, Wi-Fi, and/or CENTCOM Red team data) into

    CybOnt in a manner in which it can be ingested into the DCGS-A Cloud platform.

    As well, ingest cyber sensor datagenerated from simulators (e.g., JCSS, Cyber Virtual Ad hoc Network ( CyberVAN )). Extract the data based on the developedcyber ontology, store into the database, run the prototype/demonstratorcyber SA analytic.

    This willinvolve software development not just of the prototype algorithm but alsothe loader and translator from the raw sensor data to the

    CybOnt .

    As the cyberontology is developed, it is then tested against prototype anddemonstration cyber analytic and fusion algorithms to ensure itsutility.


    This is expected toreveal the need for refinements in the cyber ontology to support theanalytics and fusion algorithms that will contribute to cyber SA and toindicate the role of contextual influences.


    Experience:
    5+ years software engineering

    Education:

    Other:
    DoD

    Secret preferably with current TS/SCI
    Silver BulletSolutions, Inc. is an Equal Opportunity Employer (EOE).

    Qualified applicants areconsidered for employment without regard to age, race, color, religion, sex,national origin, sexual orientation, disability, or veteran status.

    If youneed assistance or an accommodation during the application process because ofa disability, it is available upon request. The company is pleased to providesuch assistance, and no applicant will be penalized as a result of such arequest.

    #J-18808-Ljbffr