Advanced Red Team Operator

Geospatial And Cloud Analytics Inc

Advanced Red Team Operator

Norfolk, VA
Full Time
Paid
  • Responsibilities

    The Advanced Red Team Operator leads and executes complex penetration testing and red team operations in support of OPTEVFOR Cyber Operational Test & Evaluation (OT&E). The role provides technical leadership across planning, preparation, execution, and post-test activities; mentors and directs basic and intermediate operators; and ensures compliance with OPTEVFOR policies, DoD guidance, and DCAT authorization requirements.

    Qualifications

    Offensive Security Certified Professional (OSCP) or equivalent offensive cybersecurity certification

    Minimum of six (6) years of experience performing penetration testing, red teaming, and/or exploitation development

    Proficiency with multiple offensive cyber tools, including:

    Metasploit

    Cobalt Strike

    Core Impact

    Burp Suite

    Nessus

    SharpHound

    Demonstrated ability to detect malicious program activity using dynamic analysis techniques

    Ability to independently plan and execute penetration testing and red team activities to accomplish assigned test objectives

    Minimum of six (6) years of demonstrated experience leading red team operators to accomplish assigned test objectives

    Key Responsibilities

    Policy, Procedures, and Governance

    Become proficient in and ensure adherence to OPTEVFOR Cyber T&E CONOPS, SOPs, policies, and guidance

    Maintain and contribute to development of 01D SOPs and technical documentation supporting DCAT authorization in accordance with DoDI 8585.01

    Research, review, prioritize, and submit operational requirements for acquisition of cyber tools and capabilities in accordance with the 01D tool approval process

    Lead development and execution of tactics, techniques, and procedures (TTPs) for penetration testing and red team operations

    Research adversary cyber actors’ TTPs, organizational structures, capabilities, personas, and operating environments, integrating findings into cyber survivability test planning and execution

    Test Planning

    Lead and participate in OPTEVFOR cyber test planning activities, including:

    Conducting open-source research and reviewing system-under-test (SUT) documentation to understand mission, architecture, interfaces, and critical components

    Identifying attack surfaces and threat vectors

    Participating in checkpoint meetings

    Guiding development of cyber test objectives

    Reviewing test plans to ensure objectives are feasible, comprehensive, and executable

    Participating in test planning site visits

    Test Preparation

    Lead preparation activities for cyber OT&E events, including:

    Participation in site pre-test coordination visits and support of test site in-briefs

    Leading red team test plan reviews

    Adding relevant system technical information to the test reference library

    Organizing and leading research briefings focused on advanced capability development for future tests

    Preparing OPTEVFOR Red Team (OPTEV-RT) Government-furnished test assets

    Test Execution

    Lead execution of assigned cyber test events, including Cooperative Vulnerability Penetration Assessments, Adversarial Assessments, and Cyber Tabletop exercises, in support of Operational Testing, Developmental Testing, risk-reduction events, and other assigned efforts

    Employ OPTEVFOR-provided and NAO-approved commercial and open-source cyber assessment tools, including but not limited to:

    Core Impact, Nmap, Burp Suite, Metasploit, Nessus

    Apply ethical hacking techniques to exploit discovered vulnerabilities and misconfigurations across:

    Operating systems (Windows, Linux, Unix)

    Network protocols and services (HTTP, FTP, DNS, PKI, HTTPS)

    Execute testing independently while providing technical direction and oversight to Basic and Intermediate operators

    Ensure all testing is conducted safely, in accordance with approved test plans and OPTEVFOR policies

    Adhere to JFHQ-DoDIN deconfliction procedures

    Verify accuracy and completeness of collected test data

    Post-Test and Continuous Improvement

    Participate in the post-test iterative process, including generation of deficiency and risk documentation

    Document lessons learned and drive continuous improvement across red team operations

    Generate and update documentation required to maintain DCAT authorization compliance in accordance with DoDI 8585.01

    Participate in capture-the-flag events, cyber off-sites, red team huddles, and technical exchange meetings; develop supporting products and materials

    Attend OPTEVFOR-required meetings in support of OT&E activities

    DCWF Knowledge, Skills, Abilities, and Tasks (KSATs)

    Skills

    Assessing existing tools to identify capability gaps and improvement opportunities

    Testing and evaluating cyber tools for operational implementation

    Knowledge management and technical documentation (e.g., wiki-based documentation)

    Processing exfiltrated data for analysis and dissemination

    Evaluating and validating locally developed tools for operational use

    Ability to collaborate with development organizations to create, adapt, and deploy tools required to achieve operational objectives

    Ability to develop new techniques for gaining, maintaining, and extending access to target systems

    Knowledge

    Active defense methodologies and system hardening techniques

    Encryption algorithms and cyber tools (e.g., TLS, PGP)

    Evasion strategies and exploitation techniques

    Forensic implications of operating system structures and processes

    Host-based security products and their impact on exploitation

    Network administration, construction, and topology

    Security hardware and software options and their effects on exploitation artifacts

    Security implications of software configurations

    Digital forensics fundamentals to extract actionable intelligence

    Cryptologic capabilities, limitations, and contributions to cyber operations

    Unix/Linux and Windows operating system internals (process management, directory structures, installed applications)

    Network collection procedures, including decryption techniques and tools

    Knowledge of deconfliction reporting processes, including coordination with external organizations