Red Team Operations Lead
Company | Booz Allen |
---|---|
Location | Indianapolis, IN, USA, McLean, VA, USA, Chicago, IL, USA, Kansas City, MO, USA, Melbourne, FL, USA, Charleston, SC, USA, Atlanta, GA, USA, Huntsville, AL, USA, Baltimore, MD, USA |
Salary | $86800 – $198000 |
Type | Full-Time |
Degrees | Bachelor’s |
Experience Level | Expert or higher |
Requirements
- 10+ years of experience with cybersecurity
- 5+ years of experience with Red Teaming, and with explaining the tools and techniques used within Red Teaming Methodology, including Recon, Exploitation, Persistence, Lateral Movement, Post Exploitation, and Exfiltration
- Experience with hands-on keyboard during multiple Red Team engagements, and planning and leading Red Team engagements
- Experience with Endpoint Detection and Response (EDR) evasion in a Multifactor Authentication (MFA) environment
- Experience with common Penetration testing and Red Team Tools, including Mythic Cobalt Strike or Sliver, and how they work
- Experience with Command-and-Control channel frameworks, offensive infrastructure deployment, Cloud technologies, reverse engineering malware, data obfuscation or encryption, Active Directory exploitation, and authentication-type technologies
- Experience working in a Windows environment and with Active Directory attack path enumeration
- Experience with OPSEC-focused infrastructure implementation, including Docker, Redirectors, or Mail Servers, and exploit development in Windows and Linux environments
- Ability to obtain and maintain a Public Trust or Suitability/Fitness determination based on client requirements
- Bachelor’s degree in CS, IT, or Engineering
Responsibilities
- Conduct advanced adversary emulation operations against targets in varying environments and active network defenders
- Lead a small team through the design, development, and decision-making in the execution of red team operations
- Ensure that operations complete objectives within the designated timeline, and status is communicated to leadership on a regular basis
- Develop comprehensive and accurate reports and presentations for both technical and executive audiences
- Ensure the post operations technical report and support activities are completed within the required timeline
- Develop scenarios and artifacts that mimic real-world adversary groups for simulated testing
- Improve team tradecraft, techniques, tactics, procedures, infrastructure, and tooling
- Provide support and mentorship to other Red Team operators
Preferred Qualifications
- Experience with wireless and Radio Frequency technologies, including Bluetooth or 802.11
- Experience with scripting and editing existing code and programming in C#, C++, Python, or GO
- Experience with Rapid Development of offensive-focused tooling and tradecraft
- Experience with phishing and other social engineering tactics
- Experience with assembly languages, including x86 or reverse engineering