The Advanced Red Team Operator leads and executes complex penetration testing and red team operations in support of OPTEVFOR Cyber Operational Test & Evaluation (OT&E). The role provides technical leadership across planning, preparation, execution, and post-test activities; mentors and directs basic and intermediate operators; and ensures compliance with OPTEVFOR policies, DoD guidance, and DCAT authorization requirements.
Qualifications
- Offensive Security Certified Professional (OSCP) or equivalent offensive cybersecurity certification
- Minimum of six (6) years of experience performing penetration testing, red teaming, and/or exploitation development
- Proficiency with multiple offensive cyber tools, including:
- Metasploit
- Cobalt Strike
- Core Impact
- Burp Suite
- Nessus
- SharpHound
- Demonstrated ability to detect malicious program activity using dynamic analysis techniques
- Ability to independently plan and execute penetration testing and red team activities to accomplish assigned test objectives
- Minimum of six (6) years of demonstrated experience leading red team operators to accomplish assigned test objectives
Key Responsibilities
Policy, Procedures, and Governance
- Become proficient in and ensure adherence to OPTEVFOR Cyber T&E CONOPS, SOPs, policies, and guidance
- Maintain and contribute to development of 01D SOPs and technical documentation supporting DCAT authorization in accordance with DoDI 8585.01
- Research, review, prioritize, and submit operational requirements for acquisition of cyber tools and capabilities in accordance with the 01D tool approval process
- Lead development and execution of tactics, techniques, and procedures (TTPs) for penetration testing and red team operations
- Research adversary cyber actors’ TTPs, organizational structures, capabilities, personas, and operating environments, integrating findings into cyber survivability test planning and execution
Test Planning
- Lead and participate in OPTEVFOR cyber test planning activities, including:
- Conducting open-source research and reviewing system-under-test (SUT) documentation to understand mission, architecture, interfaces, and critical components
- Identifying attack surfaces and threat vectors
- Participating in checkpoint meetings
- Guiding development of cyber test objectives
- Reviewing test plans to ensure objectives are feasible, comprehensive, and executable
- Participating in test planning site visits
Test Preparation
- Lead preparation activities for cyber OT&E events, including:
- Participation in site pre-test coordination visits and support of test site in-briefs
- Leading red team test plan reviews
- Adding relevant system technical information to the test reference library
- Organizing and leading research briefings focused on advanced capability development for future tests
- Preparing OPTEVFOR Red Team (OPTEV-RT) Government-furnished test assets
Test Execution
- Lead execution of assigned cyber test events, including Cooperative Vulnerability Penetration Assessments, Adversarial Assessments, and Cyber Tabletop exercises, in support of Operational Testing, Developmental Testing, risk-reduction events, and other assigned efforts
- Employ OPTEVFOR-provided and NAO-approved commercial and open-source cyber assessment tools, including but not limited to:
- Core Impact, Nmap, Burp Suite, Metasploit, Nessus
- Apply ethical hacking techniques to exploit discovered vulnerabilities and misconfigurations across:
- Operating systems (Windows, Linux, Unix)
- Network protocols and services (HTTP, FTP, DNS, PKI, HTTPS)
- Execute testing independently while providing technical direction and oversight to Basic and Intermediate operators
- Ensure all testing is conducted safely, in accordance with approved test plans and OPTEVFOR policies
- Adhere to JFHQ-DoDIN deconfliction procedures
- Verify accuracy and completeness of collected test data
Post-Test and Continuous Improvement
- Participate in the post-test iterative process, including generation of deficiency and risk documentation
- Document lessons learned and drive continuous improvement across red team operations
- Generate and update documentation required to maintain DCAT authorization compliance in accordance with DoDI 8585.01
- Participate in capture-the-flag events, cyber off-sites, red team huddles, and technical exchange meetings; develop supporting products and materials
- Attend OPTEVFOR-required meetings in support of OT&E activities
DCWF Knowledge, Skills, Abilities, and Tasks (KSATs)
Skills
- Assessing existing tools to identify capability gaps and improvement opportunities
- Testing and evaluating cyber tools for operational implementation
- Knowledge management and technical documentation (e.g., wiki-based documentation)
- Processing exfiltrated data for analysis and dissemination
- Evaluating and validating locally developed tools for operational use
- Ability to collaborate with development organizations to create, adapt, and deploy tools required to achieve operational objectives
- Ability to develop new techniques for gaining, maintaining, and extending access to target systems
Knowledge
- Active defense methodologies and system hardening techniques
- Encryption algorithms and cyber tools (e.g., TLS, PGP)
- Evasion strategies and exploitation techniques
- Forensic implications of operating system structures and processes
- Host-based security products and their impact on exploitation
- Network administration, construction, and topology
- Security hardware and software options and their effects on exploitation artifacts
- Security implications of software configurations
- Digital forensics fundamentals to extract actionable intelligence
- Cryptologic capabilities, limitations, and contributions to cyber operations
- Unix/Linux and Windows operating system internals (process management, directory structures, installed applications)
- Network collection procedures, including decryption techniques and tools
- Knowledge of deconfliction reporting processes, including coordination with external organizations
GCA is a minority veteran owned small business providing solutions to customer requirements in every realm of the intelligence and information technology industries to include, imagery/intelligence analysis, related systems engineering and administration, operations and maintenance, networking and VTC services.
GCA is committed to a safer tomorrow. The challenges facing our Nation and the World grow ever more complex and require the highest level of dedication, integrity, and service. These core values are the backbone GCA builds upon to provide our customers with exceptional service within the dynamic intelligence community and ever changing Information Technology sector.
(if you already have a resume on Indeed)
Or apply here.
Paid Time off that includes 10 federal holidays and 15 additional days.
Bereavement Leave & Parental Leave
PTO Cash out
Company Paid STD and LTD
Life and AD&D Insurance
Employee referral program
Medical, Prescription, Dental, and Vision Coverage
401k Savings and company match
