Red Team Operator

Booz Allen HamiltonAlexandria, VA
4d$62,000 - $141,000

About The Position

Red Team Operator Key Role: Operate as a member of a Red Team as a Red Team Operator, conducting advanced adversary emulation operations against real-world targets in varying environments and against active network defenders. Work with a small team through the design, development, and decision-making in the execution of Red Team operations. Ensure that operations complete objectives within the designated timeline and status is communicated to leadership on a regular basis. Develop comprehensive and accurate reports and presentations for both technical and executive audiences. Assist in ensuring the post-operations technical report and support activities are completed within the required timeline. Develop scenarios and artifacts that mimic real-world adversary groups for simulated testing. Work with the team to improve team tradecraft, techniques, tactics, procedures, infrastructure, and tooling.

Requirements

  • 1+ years of experience with offensive focused use of Red Teaming, Purple Teaming, Penetration Testing, or tool development
  • Experience with hands-on keyboard during multiple Red Team engagements
  • Experience conducting Red or Purple Teaming exercises
  • Experience with OPSEC-focused infrastructure implementation
  • Knowledge of Command-and-Control channel frameworks, offensive infrastructure deployment, cloud technologies, reverse engineering malware, data obfuscation and encryption, Active Directory, and authentication-type technologies
  • Knowledge of Red Teaming Methodology such as Recon, Exploitation, Persistence, Lateral Movement, Post Exploitation, and Exfiltration
  • Ability to obtain and maintain a Public Trust or Suitability/Fitness determination based on client requirements
  • HS diploma or GED

Nice To Haves

  • Experience with wireless and Radio Frequency technologies such as Bluetooth and 802.11
  • Experience with Rapid Development of offensive-focused tooling and tradecraft
  • Experience with phishing and other social engineering tactics
  • Experience with assembly languages, including x86 or reverse engineering
  • Bachelor's degree in CS, IT, or Engineering
  • Ability to obtain an Offensive Security Certification, including OSWP, OSCP, OSCE, or OSWE Certification, or SANS Certification such as GAWN, GPEN, or GXPN Certification, within 12 months of hire date

Responsibilities

  • Operate as a member of a Red Team as a Red Team Operator, conducting advanced adversary emulation operations against real-world targets in varying environments and against active network defenders.
  • Work with a small team through the design, development, and decision-making in the execution of Red Team operations.
  • Ensure that operations complete objectives within the designated timeline and status is communicated to leadership on a regular basis.
  • Develop comprehensive and accurate reports and presentations for both technical and executive audiences.
  • Assist in ensuring the post-operations technical report and support activities are completed within the required timeline.
  • Develop scenarios and artifacts that mimic real-world adversary groups for simulated testing.
  • Work with the team to improve team tradecraft, techniques, tactics, procedures, infrastructure, and tooling.

Benefits

  • Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care.
  • Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values.
  • Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen’s benefit programs.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service