Intermediate Red Team Operator

Geospatial And Cloud Analytics Inc

Intermediate Red Team Operator

Norfolk, VA
Full Time
Paid
  • Responsibilities

    This position is designated as an Intermediate-level Access Network Operator (DCWF Work Role 321) and is not designated as Key Personnel. The individual performs independent penetration testing and red team operations in support of OPTEVFOR Cyber Operational Test & Evaluation (OT&E) activities. The role supports cyber survivability assessments across planning, preparation, execution, and post-test phases and provides technical direction to basic-level operators when required.

    Qualifications

    The Intermediate Access Network Operator must meet all qualification requirements of a Basic Access Network Operator in addition to the following:

    Offensive Security Certified Professional (OSCP) or equivalent offensive cybersecurity certification

    Minimum of three (3) years of experience performing penetration testing, red teaming, and/or exploitation development

    Proficiency with multiple offensive cyber tools, including:

    Metasploit

    Cobalt Strike

    Core Impact

    Burp Suite

    Nessus

    SharpHound

    Demonstrated ability to detect malicious program activity using dynamic analysis techniques

    Ability to independently plan and execute penetration testing and red team activities to accomplish assigned test objectives

    Key Responsibilities

    Policy, Procedures, and Tooling

    Become proficient in OPTEVFOR Cyber T&E CONOPS, SOPs, policies, and guidance

    Maintain and contribute to the development of 01D SOPs and technical documentation supporting DCAT authorization in accordance with DoDI 8585.01

    Research, review, prioritize, and submit operational requirements for acquisition of cyber tools and capabilities in accordance with the 01D tool approval process

    Support development and execution of tactics, techniques, and procedures (TTPs) for penetration testing and red team operations

    Research adversary cyber actors’ TTPs, organizational structures, capabilities, personas, and operating environments and integrate findings into cyber survivability test planning and execution

    Test Planning

    Participate in OPTEVFOR cyber test planning activities, including:

    Conducting open-source research and reviewing system-under-test (SUT) documentation to understand mission, architecture, interfaces, and critical components

    Identifying attack surfaces and threat vectors

    Participating in cyber test planning meetings

    Guiding development of cyber test objectives

    Reviewing test plans to ensure objectives are feasible and executable

    Participating in test planning site visits

    Test Preparation

    Support preparation activities for cyber OT&E events, including:

    Participation in site pre-test coordination visits and delivery of test site in-briefs

    Reviewing approved test plans

    Adding relevant artifacts and research to the test library

    Conducting in-depth SUT research and presenting findings to the red team

    Preparing OPTEVFOR Red Team (OPTEV-RT) test assets

    Test Execution

    Execute assigned cyber test events, including Cooperative Vulnerability Penetration Assessments, Adversarial Assessments, and Cyber Tabletop exercises, in support of Operational Testing, Developmental Testing, risk reduction efforts, and other assigned events

    Employ OPTEVFOR-provided and NAO-approved commercial and open-source cyber assessment tools, including:

    Core Impact, Nmap, Burp Suite, Metasploit, Nessus

    Apply ethical hacking techniques to exploit discovered vulnerabilities and misconfigurations across:

    Operating systems (Windows, Linux, Unix)

    Network protocols and services (HTTP, FTP, DNS, PKI, HTTPS)

    Execute testing activities independently and provide technical guidance and oversight to Basic-level operators

    Ensure all testing is conducted safely, in accordance with approved test plans and OPTEVFOR policies

    Adhere to JFHQ-DoDIN deconfliction procedures

    Verify accuracy and completeness of collected test data

    Post-Test and Continuous Improvement

    Participate in the post-test iterative process, including development of deficiency and risk documentation

    Document test execution lessons learned and support continuous improvement initiatives

    Generate and update documentation required to maintain DCAT authorization in accordance with DoDI 8585.01

    Participate in capture-the-flag events, cyber off-sites, red team huddles, and technical exchange meetings; develop supporting products and materials

    Attend OPTEVFOR-required meetings in support of OT&E activities

    DCWF Knowledge, Skills, Abilities, and Tasks (KSATs)

    In addition to meeting all KSAT requirements for a Basic Access Network Operator, the Intermediate operator demonstrates the following:

    Skills

    Assessing existing tools to identify capability gaps and improvement opportunities

    Testing and evaluating cyber tools for operational implementation

    Knowledge management and technical documentation (e.g., wiki-based documentation)

    Processing exfiltrated data for analysis and dissemination

    Evaluating and validating locally developed tools for operational use

    Knowledge

    Active defense methodologies and system hardening techniques

    Encryption algorithms and cyber tools (e.g., TLS, PGP)

    Evasion strategies and exploitation techniques

    Forensic implications of operating system structures and processes

    Host-based security products and their impact on exploitation

    Network administration, construction, and topology

    Security hardware and software options and their effects on exploitation artifacts

    Security implications of software configurations

    Digital forensics fundamentals to extract actionable intelligence

    Cryptologic capabilities, limitations, and contributions to cyber operations

    Unix/Linux and Windows operating system internals (process management, directory structures, installed applications)

    Network collection procedures, including decryption techniques and tools