Huh? First there was the unspoken “O” word. Then it finally started making it’s way into speeches of high-ranking current and former government officials. And now it’s in job posts. Of course a private company actually performing offensive activities would likely be illegal in most cases … although I’m sure there’s a sneaky way around that (e.g., re-terming it as “active defense” or something).” However most likely this person would be serving some government agency in some capacity … so who knows… It’ll be interesting to watch how “offensive” trends in the coming months and years. And with all this press I’m sure NG is getting lots of applications for this position.
via ThreatPost.com (emphasis mine)
Defense giant Northrop Grumman is hiring software engineers to help it carry out “offensive cyberspace operations,” according to a recent job posting.
The job posting, for a “Cyber Software Engineer 2” appeared on the Website Clearancejobs.com and described a position on a Northrop R&D project to “plan, execute and assess an Offensive Cyberspace Operation (OCO) mission” that would include familiarity with tools like Metasploit and Google Earth and “integration of capabilities such as command linkages, data flows, situation awareness (SA) and command and control (C2) tools.”
Firms like Northrop have repeatedly been the target of sustained and sophisticated attacks from outside agents. Many of those attackers – euphemistically described as “Advanced Persistent Threats” – or APTs – are believed to have links to China and groups working for the People’s Liberation Army (PLA).
A spokeswoman for Northrop Grumman confirmed the validity of the job posting, but declined to elaborate on what Northrop was referring to with the term “Offensive Cyberspace Operations.”