Logo
Geospatial And Cloud Analytics Inc

Basic Red Team Operator

Geospatial And Cloud Analytics Inc, Norfolk, Virginia, United States, 23500

Save Job

The Basic Red Team Operator supports OPTEVFOR Cyber Operational Test & Evaluation (OT&E) activities by conducting penetration testing and red team operations under the guidance of intermediate or advanced red team operators. The role contributes to test planning, preparation, execution, and post-test activities in support of cooperative vulnerability penetration assessments, adversarial assessments, and cyber tabletop events.

Qualifications

Certified Ethical Hacker (CEH)

certification or equivalent/higher offensive cybersecurity certification

Minimum of

one (1) year

of experience performing penetration testing, red teaming, and/or exploitation development

Proficiency in at least

two operating systems , including

Windows, Linux, or Unix variants

Proficiency with at least

one offensive security tool , such as:

Metasploit

Cobalt Strike

Core Impact

Ability to operate independently to conduct penetration testing or red team activities under guidance from senior or intermediate operators

Ability to independently generate

red team reports and supporting documentation

Key Responsibilities Orientation and Tooling

Become proficient in OPTEVFOR Cyber Test & Evaluation

CONOPS, SOPs, policies, and guidance

Research and submit operational requirements for acquisition of cyber tools and equipment in accordance with the

01D tool approval process

Support development and execution of

tactics, techniques, and procedures (TTPs)

for penetration testing and red team operations

Test Planning

Participate in OPTEVFOR cyber test planning activities, including:

Conducting

open-source research

and reviewing system-under-test (SUT) documentation to understand mission, architecture, interfaces, and critical components

Identifying attack surfaces and potential threat vectors

Participating in checkpoint meetings

Supporting development of test objectives

Reviewing test plans to ensure objectives are feasible and executable

Participating in test planning site visits

Test Preparation

Support preparation for cyber OT&E execution, including:

Participation in site pre-test coordination visits and delivery of test site in-briefs

Reviewing approved test plans

Adding relevant information and artifacts to the test library

Conducting focused research on SUTs and presenting findings to the red team

Preparing OPTEVFOR Red Team test assets and environments

Test Execution

Execute assigned cyber test events, including

Cooperative Vulnerability Penetration Assessments ,

Adversarial Assessments , and

Cyber Tabletops , in support of Operational Testing, Developmental Testing, risk reduction events, and other assigned events

Employ OPTEVFOR-provided and

NAO-approved commercial and open-source cyber assessment tools , including but not limited to:

Core Impact, Nmap, Burp Suite, Metasploit, Nessus

Apply ethical hacking techniques to exploit discovered vulnerabilities and misconfigurations associated with:

Operating systems (Windows, Linux, Unix)

Network protocols and services (HTTP, FTP, DNS, PKI, HTTPS)

Execute assigned tasks independently with oversight from intermediate or advanced operators

Ensure all testing is conducted safely, in accordance with approved test plans and OPTEVFOR policies

Adhere to

JFHQ-DoDIN deconfliction procedures

Verify accuracy and completeness of collected test data

Post-Test Activities

Participate in the

post-test iterative process , including development of deficiency and risk documentation

Document

lessons learned

and contribute to continuous improvement of red team operations

Participate in capture-the-flag events, cyber off-sites, red team huddles, and technical exchange meetings; develop required products and materials to support these activities

Attend OPTEVFOR-required meetings in support of OT&E activities

DCWF Knowledge, Skills, Abilities, and Tasks (KSATs) Tasks & Abilities

Analyze target operational architectures to identify access vectors

Conduct network reconnaissance, scouting, and vulnerability analysis

Perform on-net and off-net activities to control and exfiltrate data

Conduct open-source intelligence (OSINT) collection

Deploy and utilize exploitation tools (e.g., backdoors, sniffers)

Exploit network, security, and endpoint devices using approved methods

Facilitate access via physical or wireless means

Identify network strengths, weaknesses, and vulnerabilities

Translate customer requirements into operational actions

Skills

Interpreting vulnerability scan results

Extracting and analyzing packet capture data

Using remote command-line and GUI tools

Processing collected data for follow-on analysis

Verifying file integrity

Determining patch levels and identifying patch signatures

Knowledge

Computer hardware components and architectures (CPU, NICs, storage)

Auditing and logging procedures

Programming fundamentals

Malware concepts

Network infrastructure devices (routers, switches, firewalls)

Exploitation tool structures and techniques

System administration concepts for Windows and Unix/Linux

Network architectures, protocols, and services (TCP/IP, DNS, web, mail)

Virtual machine technologies

Collection management processes, capabilities, and limitations

#J-18808-Ljbffr