Posted in

Red Team Operations Lead

Red Team Operations Lead

CompanyBooz Allen
LocationIndianapolis, IN, USA, McLean, VA, USA, Chicago, IL, USA, Kansas City, MO, USA, Melbourne, FL, USA, Charleston, SC, USA, Atlanta, GA, USA, Huntsville, AL, USA, Baltimore, MD, USA
Salary$86800 – $198000
TypeFull-Time
DegreesBachelor’s
Experience LevelExpert or higher

Requirements

  • 10+ years of experience with cybersecurity
  • 5+ years of experience with Red Teaming, and with explaining the tools and techniques used within Red Teaming Methodology, including Recon, Exploitation, Persistence, Lateral Movement, Post Exploitation, and Exfiltration
  • Experience with hands-on keyboard during multiple Red Team engagements, and planning and leading Red Team engagements
  • Experience with Endpoint Detection and Response (EDR) evasion in a Multifactor Authentication (MFA) environment
  • Experience with common Penetration testing and Red Team Tools, including Mythic Cobalt Strike or Sliver, and how they work
  • Experience with Command-and-Control channel frameworks, offensive infrastructure deployment, Cloud technologies, reverse engineering malware, data obfuscation or encryption, Active Directory exploitation, and authentication-type technologies
  • Experience working in a Windows environment and with Active Directory attack path enumeration
  • Experience with OPSEC-focused infrastructure implementation, including Docker, Redirectors, or Mail Servers, and exploit development in Windows and Linux environments
  • Ability to obtain and maintain a Public Trust or Suitability/Fitness determination based on client requirements
  • Bachelor’s degree in CS, IT, or Engineering

Responsibilities

  • Conduct advanced adversary emulation operations against targets in varying environments and active network defenders
  • Lead a small team through the design, development, and decision-making in the execution of red team operations
  • Ensure that operations complete objectives within the designated timeline, and status is communicated to leadership on a regular basis
  • Develop comprehensive and accurate reports and presentations for both technical and executive audiences
  • Ensure the post operations technical report and support activities are completed within the required timeline
  • Develop scenarios and artifacts that mimic real-world adversary groups for simulated testing
  • Improve team tradecraft, techniques, tactics, procedures, infrastructure, and tooling
  • Provide support and mentorship to other Red Team operators

Preferred Qualifications

  • Experience with wireless and Radio Frequency technologies, including Bluetooth or 802.11
  • Experience with scripting and editing existing code and programming in C#, C++, Python, or GO
  • Experience with Rapid Development of offensive-focused tooling and tradecraft
  • Experience with phishing and other social engineering tactics
  • Experience with assembly languages, including x86 or reverse engineering