user avatar

Intermediate Red Team Operator

Artech Information Systems

Posted today
Public Trust
Unspecified
Unspecified
washington dc, DC (On-Site/Office)

Job Title: Intermediate Red Team Operator
Location: Washington, DC (Hybrid Onsite 1 Day)
Duration: 12 Months and Possible Extension Contract To Hire

Job Description:
The operator will execute red team exercises on production IT systems, facilities, and personnel; conduct spear-phishing campaigns and exploit external assets to gain internal access; perform post-exploitation activities to meet objectives; and carry out on-site penetration assessments. The role involves using custom code and commercial exploitation frameworks, operating within established ROE/SOPs, and applying proven red team tradecraft throughout exercises.

Location: National Capital Region (Client) - Hybrid (80% remote)
✈️ Travel: Up to 10%, reimbursed per IW policy, GSA Per Diem, and DoD JTR

️ Clearance Requirement: United States Citizen with ability to obtain and hold a Public Trust clearance
Responsibilities:
  • Conduct red team exercises against production IT systems, facilities, and personnel belonging to the AO and the Courts.
  • Develop and conduct spear phishing campaigns to gain internal network access.
  • Conduct exploitation of external facing assets to gain internal network access.
  • Conduct post-exploitation actions towards exercise objectives.
  • Conduct on-site physical penetration assessments at various federal courthouses and other Court locations to obtain access to internal networks.
  • Use custom code and/or commercial-off-the-shelf (COTS) exploitation frameworks to bypass and penetrate network and system defenses.
  • Comply with the unique rules of engagement (ROE) provided for each exercise, along with the standard operating procedures (SOP) for Red Team operations.
  • Employ red team tradecraft while conducting exercises.
Basic Qualifications:
  • Minimum 4 years of direct, hands-on technical red team and/or government computer network exploitation/offensive operations experience.
  • Minimum 4 years of hands-on experience with red team tools (Cobalt Strike, Kali, etc.) in a production environment.
  • Minimum 4 years of experience with network technologies and protocols (OSI model, routing, troubleshooting).
  • Minimum 4 years of experience using and investigating "living off the land" TTPs.
  • Ability to secure, configure, deploy, and troubleshoot Windows, Linux, and MacOS systems.
  • Minimum 4 years of experience scripting in Bash, C#, Ruby, Perl, Python, PHP, etc.
  • Minimum 4 years of social engineering and physical penetration testing.
  • Minimum 4 years of experience writing cybersecurity assessment reports.
  • Experience with Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST), including integrating results into developer workflows is preferred
  • Knowledge of OWASP Top 10 & SANS Top 25 vulnerabilities, with ability to exploit/remediate is preferred
  • Experience with application security testing for web, mobile, and API endpoints is preferred


Preferred Certifications:

  • CRTO certification (or ability to obtain within 3 months of onboarding) is required.
  • OSCP and/or GPEN certifications are preferred, but not required.
group id: artech

Match Score

Powered by IntelliSearch™
image match score
Create an account or Login to see how closely you match to this job!