×
Register Here to Apply for Jobs or Post Jobs. X

Red Team Operator

Job in Virginia Beach, Virginia, 23450, USA
Listing for: GCA
Full Time position
Listed on 2026-01-12
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below
Position: Basic Red Team Operator

Overview

Join to apply for the Basic Red Team Operator role at GCA
. The Basic Red Team Operator supports OPTEVFOR Cyber Operational Test & Evaluation (OT&E) activities by conducting penetration testing and red team operations under the guidance of intermediate or advanced red team operators. The role contributes to test planning, preparation, execution, and post-test activities in support of cooperative vulnerability penetration assessments, adversarial assessments, and cyber tabletop events.

Qualifications
  • Certified Ethical Hacker (CEH) certification or equivalent/higher offensive cybersecurity certification
  • Minimum of one (1) year of experience performing penetration testing, red teaming, and/or exploitation development
  • Proficiency in at least two operating systems, including Windows, Linux, or Unix variants
  • Proficiency with at least one offensive security tool, such as:
    • Metasploit
    • Cobalt Strike
    • Core Impact
  • Ability to operate independently to conduct penetration testing or red team activities under guidance from senior or intermediate operators
  • Ability to independently generate red team reports and supporting documentation
Key Responsibilities
  • Orientation and Tooling
    • Become proficient in OPTEVFOR Cyber Test & Evaluation CONOPS, SOPs, policies, and guidance
    • Research and submit operational requirements for acquisition of cyber tools and equipment in accordance with the 01D tool approval process
    • Support development and execution of tactics, techniques, and procedures (TTPs) for penetration testing and red team operations
  • Test Planning
    • Participate in OPTEVFOR cyber test planning activities, including:
    • Conducting open-source research and reviewing system-under-test (SUT) documentation to understand mission, architecture, interfaces, and critical components
    • Identifying attack surfaces and potential threat vectors
    • Participating in checkpoint meetings
    • Supporting development of test objectives
    • Reviewing test plans to ensure objectives are feasible and executable
    • Participating in test planning site visits
  • Test Preparation
    • Support preparation for cyber OT&E execution, including:
    • Participation in site pre-test coordination visits and delivery of test site in-briefs
    • Reviewing approved test plans
    • Adding relevant information and artifacts to the test library
    • Conducting focused research on SUTs and presenting findings to the red team
    • Preparing OPTEVFOR Red Team test assets and environments
  • Test Execution
    • Execute assigned cyber test events, including Cooperative Vulnerability Penetration Assessments, Adversarial Assessments, and Cyber Tabletops, in support of Operational Testing, Developmental Testing, risk reduction events, and other assigned events
    • Employ OPTEVFOR-provided and NAO-approved commercial and open-source cyber assessment tools, including but not limited to:
    • Core Impact, Nmap, Burp Suite, Metasploit, Nessus
    • Apply ethical hacking techniques to exploit discovered vulnerabilities and misconfigurations associated with:
    • Operating systems (Windows, Linux, Unix)
    • Network protocols and services (HTTP, FTP, DNS, PKI, HTTPS)
    • Execute assigned tasks independently with oversight from intermediate or advanced operators
    • Ensure all testing is conducted safely, in accordance with approved test plans and OPTEVFOR policies
    • Adhere to JFHQ-DoDIN deconfliction procedures
    • Verify accuracy and completeness of collected test data
  • Post-Test Activities
    • Participate in the post-test iterative process, including development of deficiency and risk documentation
    • Document lessons learned and contribute to continuous improvement of red team operations
    • Participate in capture-the-flag events, cyber off-sites, red team huddles, and technical exchange meetings; develop required products and materials to support these activities
    • Attend OPTEVFOR-required meetings in support of OT&E activities
  • KSATs and Related Tasks
    • Analyze target operational architectures to identify access vectors
    • Conduct network reconnaissance, scouting, and vulnerability analysis
    • Perform on-net and off-net activities to control and exfiltrate data
    • Conduct open-source intelligence (OSINT) collection
    • Deploy and utilize exploitation tools (e.g., backdoors, sniffers)
    • Exploit network, security, and endpoint devices using approved methods
    • Facilitate access via physical or wireless means
    • Identify network strengths, weaknesses, and vulnerabilities
    • Translate customer requirements into operational actions

Note:

This description focuses on responsibilities and qualifications as provided and keeps the original content language.

#J-18808-Ljbffr
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary