Intermediate Red Team Operator jobs in United States
cer-icon
Apply on Employer Site
company-logo

GCA · 2 days ago

Intermediate Red Team Operator

GCA is a minority veteran owned small business providing solutions in the intelligence and information technology industries. They are seeking an Intermediate Red Team Operator to perform independent penetration testing and red team operations in support of OPTEVFOR Cyber Operational Test & Evaluation activities, providing technical direction to basic-level operators when required.

Information Technology & Services

Responsibilities

Become proficient in OPTEVFOR Cyber T&E CONOPS, SOPs, policies, and guidance
Maintain and contribute to the development of 01D SOPs and technical documentation supporting DCAT authorization in accordance with DoDI 8585.01
Research, review, prioritize, and submit operational requirements for acquisition of cyber tools and capabilities in accordance with the 01D tool approval process
Support development and execution of tactics, techniques, and procedures (TTPs) for penetration testing and red team operations
Research adversary cyber actors’ TTPs, organizational structures, capabilities, personas, and operating environments and integrate findings into cyber survivability test planning and execution
Participate in OPTEVFOR cyber test planning activities, including: Conducting open-source research and reviewing system-under-test (SUT) documentation to understand mission, architecture, interfaces, and critical components
Identifying attack surfaces and threat vectors
Participating in cyber test planning meetings
Guiding development of cyber test objectives
Reviewing test plans to ensure objectives are feasible and executable
Participating in test planning site visits
Support preparation activities for cyber OT&E events, including: Participation in site pre-test coordination visits and delivery of test site in-briefs
Reviewing approved test plans
Adding relevant artifacts and research to the test library
Conducting in-depth SUT research and presenting findings to the red team
Preparing OPTEVFOR Red Team (OPTEV-RT) test assets
Execute assigned cyber test events, including Cooperative Vulnerability Penetration Assessments, Adversarial Assessments, and Cyber Tabletop exercises, in support of Operational Testing, Developmental Testing, risk reduction efforts, and other assigned events
Employ OPTEVFOR-provided and NAO-approved commercial and open-source cyber assessment tools, including: Core Impact, Nmap, Burp Suite, Metasploit, Nessus
Apply ethical hacking techniques to exploit discovered vulnerabilities and misconfigurations across: Operating systems (Windows, Linux, Unix)
Network protocols and services (HTTP, FTP, DNS, PKI, HTTPS)
Execute testing activities independently and provide technical guidance and oversight to Basic-level operators
Ensure all testing is conducted safely, in accordance with approved test plans and OPTEVFOR policies
Adhere to JFHQ-DoDIN deconfliction procedures
Verify accuracy and completeness of collected test data
Participate in the post-test iterative process, including development of deficiency and risk documentation
Document test execution lessons learned and support continuous improvement initiatives
Generate and update documentation required to maintain DCAT authorization in accordance with DoDI 8585.01
Participate in capture-the-flag events, cyber off-sites, red team huddles, and technical exchange meetings; develop supporting products and materials
Attend OPTEVFOR-required meetings in support of OT&E activities

Qualification

Offensive Security Certified ProfessionalPenetration TestingRed Team OperationsOffensive Cyber ToolsDynamic Analysis TechniquesNetwork AdministrationKnowledge ManagementActive Defense MethodologiesDigital Forensics FundamentalsTechnical Documentation

Required

Offensive Security Certified Professional (OSCP) or equivalent offensive cybersecurity certification
Minimum of three (3) years of experience performing penetration testing, red teaming, and/or exploitation development
Proficiency with multiple offensive cyber tools, including: Metasploit, Cobalt Strike, Core Impact, Burp Suite, Nessus, SharpHound
Demonstrated ability to detect malicious program activity using dynamic analysis techniques
Ability to independently plan and execute penetration testing and red team activities to accomplish assigned test objectives
Become proficient in OPTEVFOR Cyber T&E CONOPS, SOPs, policies, and guidance
Maintain and contribute to the development of 01D SOPs and technical documentation supporting DCAT authorization in accordance with DoDI 8585.01
Research, review, prioritize, and submit operational requirements for acquisition of cyber tools and capabilities in accordance with the 01D tool approval process
Support development and execution of tactics, techniques, and procedures (TTPs) for penetration testing and red team operations
Research adversary cyber actors' TTPs, organizational structures, capabilities, personas, and operating environments and integrate findings into cyber survivability test planning and execution
Conducting open-source research and reviewing system-under-test (SUT) documentation to understand mission, architecture, interfaces, and critical components
Identifying attack surfaces and threat vectors
Participating in cyber test planning meetings
Guiding development of cyber test objectives
Reviewing test plans to ensure objectives are feasible and executable
Participating in test planning site visits
Participation in site pre-test coordination visits and delivery of test site in-briefs
Reviewing approved test plans
Adding relevant artifacts and research to the test library
Conducting in-depth SUT research and presenting findings to the red team
Preparing OPTEVFOR Red Team (OPTEV-RT) test assets
Execute assigned cyber test events, including Cooperative Vulnerability Penetration Assessments, Adversarial Assessments, and Cyber Tabletop exercises, in support of Operational Testing, Developmental Testing, risk reduction efforts, and other assigned events
Employ OPTEVFOR-provided and NAO-approved commercial and open-source cyber assessment tools, including: Core Impact, Nmap, Burp Suite, Metasploit, Nessus
Apply ethical hacking techniques to exploit discovered vulnerabilities and misconfigurations across: Operating systems (Windows, Linux, Unix), Network protocols and services (HTTP, FTP, DNS, PKI, HTTPS)
Execute testing activities independently and provide technical guidance and oversight to Basic-level operators
Ensure all testing is conducted safely, in accordance with approved test plans and OPTEVFOR policies
Adhere to JFHQ-DoDIN deconfliction procedures
Verify accuracy and completeness of collected test data
Participate in the post-test iterative process, including development of deficiency and risk documentation
Document test execution lessons learned and support continuous improvement initiatives
Generate and update documentation required to maintain DCAT authorization in accordance with DoDI 8585.01
Participate in capture-the-flag events, cyber off-sites, red team huddles, and technical exchange meetings; develop supporting products and materials
Attend OPTEVFOR-required meetings in support of OT&E activities
Assessing existing tools to identify capability gaps and improvement opportunities
Testing and evaluating cyber tools for operational implementation
Knowledge management and technical documentation (e.g., wiki-based documentation)
Processing exfiltrated data for analysis and dissemination
Evaluating and validating locally developed tools for operational use
Active defense methodologies and system hardening techniques
Encryption algorithms and cyber tools (e.g., TLS, PGP)
Evasion strategies and exploitation techniques
Forensic implications of operating system structures and processes
Host-based security products and their impact on exploitation
Network administration, construction, and topology
Security hardware and software options and their effects on exploitation artifacts
Security implications of software configurations
Digital forensics fundamentals to extract actionable intelligence
Cryptologic capabilities, limitations, and contributions to cyber operations
Unix/Linux and Windows operating system internals (process management, directory structures, installed applications)
Network collection procedures, including decryption techniques and tools

Company

GCA is a veteran owned small business providing solutions to customer requirements in every realm of the intelligence and information technology industries to include, imagery/intelligence analysis, related systems engineering and administration, operations and maintenance, networking and VTC services.

Funding

Current Stage
Early Stage

Leadership Team

leader-logo
Anthony Tannoya
Chief Executive Officer
linkedin
leader-logo
Michael Dorr
Vice President & COO
linkedin
Company data provided by crunchbase