BreakPoint Labs LLC
BreakPoint Labs is seeking an Intermediate Red Team Operator to support Operational Testing, Developmental Testing, and risk reduction events through penetration testing and red teaming.
Responsibilities
Executing test events, including Cooperative Vulnerability Penetration Assessments, Adversarial Assessments, and Cyber Tabletops.
Employing ethical hacking expertise to exploit discovered vulnerabilities and misconfigurations in operating systems (Windows, Linux), protocols (HTTP, FTP), and network security services (PKI, HTTPS).
Researching adversary cyber actors’ TTPs, organizational structures, capabilities, and personas to integrate findings into cyber survivability test planning and execution.
Participating in cyber test planning, which includes conducting open-source research, reviewing system documentation to identify attack surfaces, and guiding the development of test plan objectives.
Participating in test preparation activities, such as site pre-test coordination visits, organizing research presentations for advanced capability development, and preparing test assets.
Supporting the development and execution of TTPs for penetration testing or Red Teaming.
Reviewing and prioritizing operational requirements for the acquisition of equipment or cyber capabilities.
Following Joint Forces Headquarters (JFHQ)-DODIN deconfliction procedures and ensuring tests are conducted safely in accordance with test plans.
Participating in the post-test iterative process, including documenting lessons learned and generating deficiency/risk sheets.
Collaborating with development organizations to create and deploy necessary tools.
Required Experience Duration, and Discipline
Minimum of 3 years’ experience performing any combination of: penetration testing, red teaming, or exploitation development.
Technical Proficiency: Must be proficient in using commercial and open-source network cyber assessment tools, such as Cobalt Strike, Nmap, Burp Suite, Kali, Bloodhound, etc.
Must possess expertise in exploiting vulnerabilities associated with various operating systems, protocols, and networks.
Travel Requirements 30%
Require Certifications Security+ Continuing Education (CE) [CompTIA] and Offensive Security Certified Professional (OSCP) [Off Sec]
Required Security Clearance DoD Top Secret / SCI
Required Education High School Diploma
#J-18808-Ljbffr
Responsibilities
Executing test events, including Cooperative Vulnerability Penetration Assessments, Adversarial Assessments, and Cyber Tabletops.
Employing ethical hacking expertise to exploit discovered vulnerabilities and misconfigurations in operating systems (Windows, Linux), protocols (HTTP, FTP), and network security services (PKI, HTTPS).
Researching adversary cyber actors’ TTPs, organizational structures, capabilities, and personas to integrate findings into cyber survivability test planning and execution.
Participating in cyber test planning, which includes conducting open-source research, reviewing system documentation to identify attack surfaces, and guiding the development of test plan objectives.
Participating in test preparation activities, such as site pre-test coordination visits, organizing research presentations for advanced capability development, and preparing test assets.
Supporting the development and execution of TTPs for penetration testing or Red Teaming.
Reviewing and prioritizing operational requirements for the acquisition of equipment or cyber capabilities.
Following Joint Forces Headquarters (JFHQ)-DODIN deconfliction procedures and ensuring tests are conducted safely in accordance with test plans.
Participating in the post-test iterative process, including documenting lessons learned and generating deficiency/risk sheets.
Collaborating with development organizations to create and deploy necessary tools.
Required Experience Duration, and Discipline
Minimum of 3 years’ experience performing any combination of: penetration testing, red teaming, or exploitation development.
Technical Proficiency: Must be proficient in using commercial and open-source network cyber assessment tools, such as Cobalt Strike, Nmap, Burp Suite, Kali, Bloodhound, etc.
Must possess expertise in exploiting vulnerabilities associated with various operating systems, protocols, and networks.
Travel Requirements 30%
Require Certifications Security+ Continuing Education (CE) [CompTIA] and Offensive Security Certified Professional (OSCP) [Off Sec]
Required Security Clearance DoD Top Secret / SCI
Required Education High School Diploma
#J-18808-Ljbffr