Conduct interactive on-net operations to exploit and access malicious infrastructures utilizing MA tactics, techniques, and protocols without compromising the identity of the operator or the organization. Use customized scripts, functions, and tools to enable the customer to conduct interactive on-net operations efficiently, effectively, which produce cyber effects against the adversary, as the mission requires. Use open-source and proprietary tools for network navigation, tactical forensic analysis, and intelligence collection. Assist in the development of exploitation capabilities against known and newly identified targets; inform and refine operational requirements for new tools. Assist in the development of exploits for operating systems, applications, and services. Participate in planning operations, discuss requirements, features, and end-goal expectations with the customer and developers – influence and find creative solutions to achieve the mission. Identify problems, obstacles, and impediments before conducting an operation and report concerns to the customer. Document guidance on how to perform interactive on-net operations to the customer and share procedures with colleagues and other sites. Build and maintain a strong relationship with your team and with the customer.