Posted today
Public Trust
Unspecified
Unspecified
washington dc, DC (On-Site/Office)
Job Title: Intermediate Red Team Operator
Location: Washington, DC (Hybrid Onsite 1 Day)
Duration: 12 Months and Possible Extension Contract To Hire
Job Description:
The operator will execute red team exercises on production IT systems, facilities, and personnel; conduct spear-phishing campaigns and exploit external assets to gain internal access; perform post-exploitation activities to meet objectives; and carry out on-site penetration assessments. The role involves using custom code and commercial exploitation frameworks, operating within established ROE/SOPs, and applying proven red team tradecraft throughout exercises.
Location: National Capital Region (Client) - Hybrid (80% remote)
✈️ Travel: Up to 10%, reimbursed per IW policy, GSA Per Diem, and DoD JTR
️ Clearance Requirement: United States Citizen with ability to obtain and hold a Public Trust clearance
Responsibilities:
Preferred Certifications:
Location: Washington, DC (Hybrid Onsite 1 Day)
Duration: 12 Months and Possible Extension Contract To Hire
Job Description:
The operator will execute red team exercises on production IT systems, facilities, and personnel; conduct spear-phishing campaigns and exploit external assets to gain internal access; perform post-exploitation activities to meet objectives; and carry out on-site penetration assessments. The role involves using custom code and commercial exploitation frameworks, operating within established ROE/SOPs, and applying proven red team tradecraft throughout exercises.
Location: National Capital Region (Client) - Hybrid (80% remote)
✈️ Travel: Up to 10%, reimbursed per IW policy, GSA Per Diem, and DoD JTR
️ Clearance Requirement: United States Citizen with ability to obtain and hold a Public Trust clearance
Responsibilities:
- Conduct red team exercises against production IT systems, facilities, and personnel belonging to the AO and the Courts.
- Develop and conduct spear phishing campaigns to gain internal network access.
- Conduct exploitation of external facing assets to gain internal network access.
- Conduct post-exploitation actions towards exercise objectives.
- Conduct on-site physical penetration assessments at various federal courthouses and other Court locations to obtain access to internal networks.
- Use custom code and/or commercial-off-the-shelf (COTS) exploitation frameworks to bypass and penetrate network and system defenses.
- Comply with the unique rules of engagement (ROE) provided for each exercise, along with the standard operating procedures (SOP) for Red Team operations.
- Employ red team tradecraft while conducting exercises.
- Minimum 4 years of direct, hands-on technical red team and/or government computer network exploitation/offensive operations experience.
- Minimum 4 years of hands-on experience with red team tools (Cobalt Strike, Kali, etc.) in a production environment.
- Minimum 4 years of experience with network technologies and protocols (OSI model, routing, troubleshooting).
- Minimum 4 years of experience using and investigating "living off the land" TTPs.
- Ability to secure, configure, deploy, and troubleshoot Windows, Linux, and MacOS systems.
- Minimum 4 years of experience scripting in Bash, C#, Ruby, Perl, Python, PHP, etc.
- Minimum 4 years of social engineering and physical penetration testing.
- Minimum 4 years of experience writing cybersecurity assessment reports.
- Experience with Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST), including integrating results into developer workflows is preferred
- Knowledge of OWASP Top 10 & SANS Top 25 vulnerabilities, with ability to exploit/remediate is preferred
- Experience with application security testing for web, mobile, and API endpoints is preferred
Preferred Certifications:
- CRTO certification (or ability to obtain within 3 months of onboarding) is required.
- OSCP and/or GPEN certifications are preferred, but not required.
group id: artech