Enable job alerts via email!

Red Team Operations Lead

Booz Allen Hamilton

McLean (VA)

On-site

USD 86,000 - 198,000

Full time

16 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

A leading company in cybersecurity is seeking a Red Team Operations Lead to conduct advanced adversary emulation operations. The role involves leading a team, ensuring operational objectives are met, and developing comprehensive reports. Candidates should have extensive experience in cybersecurity and Red Teaming methodologies, with a Bachelor's degree in a relevant field.

Benefits

Health benefits
Paid leave
Professional development
Tuition assistance
Work-life programs

Qualifications

  • 10+ years of experience with cybersecurity.
  • 5+ years of experience with Red Teaming methodologies.
  • Experience in a Windows environment and Active Directory.

Responsibilities

  • Lead Red Team operations and ensure objectives are met.
  • Develop scenarios mimicking real-world adversaries.
  • Mentor and support other Red Team operators.

Skills

Cybersecurity
Red Teaming
Endpoint Detection and Response
Penetration Testing
Cloud Technologies
Scripting
Reverse Engineering

Education

Bachelor's degree in CS, IT, or Engineering

Tools

Mythic Cobalt Strike
Sliver
Docker

Job description

Your growth matters to us - explore our career development opportunities.

BE EMPOWERED TO SUCCEED

Connect with others in our people-first culture and enhance our collective ingenuity.

SUPPORT YOUR WELLBEING

Learn how we’ll support you as you pursue a balanced, fulfilling life.

YOUR CANDIDATE JOURNEY

Discover what to expect during your journey as a candidate with us.

Operate as a Red Team Operations Lead, c ond ucting advanced adversary emulation operations against targets in varying environments and active network defenders. Lead a small team through the design, development, and decision-making in the execution of red team operations. Ensure that operations complete objectives within the designated timeline, and status is communicated to leadership on a regular basis, and develop comprehensive and accurate reports and presentations for both technical and executive audiences. Ensure the post operations technical report and support activities are completed within the required timeline. Develop scenarios and artifacts that mimic real-world adversary groups for simulated testing. Improve team tradecraft, techniques, tactics, procedures, infrastructure, and tooling. Provide support and mentorship to other Red Team operators.

Basic Qualifications:

10+ years of experience with cybersecurity

5+ years of experience with Red Teaming, and with explaining the tools and techniques used within Red Teaming Methodology, including Recon, Exploitation, Persistence, Lateral Movement, Post Exploitation, and Exfiltration

Experience with hands-on keyboard during multiple Red Team engagements, and planning and leading Red Team engagements

Experience with Endpoint Detection and Response (EDR) evasion in a Multifactor Authentication (MFA) environment

Experience with common Penetration testing and Red Team Tools, including Mythic Cobalt Strike or Sliver, and how they work

Experience with Command-and-Control channel frameworks, offensive infrastructure deployment, Cloud technologies, reverse engineering malware, data obfuscation or encryption, Active Directory exploitation, and authentication-type technologies

Experience working in a Windows environment and with Active Directory attack path enumeration

Experience with OPSEC-focused infrastructure implementation, including Docker, Redirectors, or Mail Servers, and exploit development in Windows and Linux environments

Ability to obtain and maintain a Public Trust or Suitability/Fitness determination based on client requirements

Bachelor's degree in CS, IT, or Engineering

Additional Qualifications:

Experience with wireless and Radio Frequency technologies, including Bluetooth or 802.11

Experience with scripting and editing existing code and programming in C#, C++, Python, or GO

Experience with Rapid Development of offensive-focused tooling and tradecraft

Experience with phishing and other so cia l engineering tactics

Experience with assembly languages, including x86 or reverse engineering

Vetting:

Applicants selected will be subject to a government investigation and may need to meet eligibility requirements of the U.S. government client .

Compensation

At Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well-being. Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care. Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values. Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen’s benefit programs. Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits. We encourage you to learn more about our total benefits by visiting the Resource page on our Careers site and reviewing Our Employee Benefits page.

Salary at Booz Allen is determined by various factors, including but not limited to location, the individual’s particular combination of education, knowledge, skills, competencies, and experience, as well as contract-specific affordability and organizational requirements. The projected compensation range for this position is $86,800.00 to $198,000.00 (annualized USD). The estimate displayed represents the typical salary range for this position and is just one component of Booz Allen’s total compensation package for employees. This posting will close within 90 days from the Posting Date.

Red Team Operations Lead

Key Role:

Operate as a Red Team Operations Lead, c ond ucting advanced adversary emulation operations against targets in varying environments and active network defenders. Lead a small team through the design, development, and decision-making in the execution of red team operations. Ensure that operations complete objectives within the designated timeline, and status is communicated to leadership on a regular basis, and develop comprehensive and accurate reports and presentations for both technical and executive audiences. Ensure the post operations technical report and support activities are completed within the required timeline. Develop scenarios and artifacts that mimic real-world adversary groups for simulated testing. Improve team tradecraft, techniques, tactics, procedures, infrastructure, and tooling. Provide support and mentorship to other Red Team operators.

Basic Qualifications:

  • 10+ years of experience with cybersecurity

  • 5+ years of experience with Red Teaming, and with explaining the tools and techniques used within Red Teaming Methodology, including Recon, Exploitation, Persistence, Lateral Movement, Post Exploitation, and Exfiltration

  • Experience with hands-on keyboard during multiple Red Team engagements, and planning and leading Red Team engagements

  • Experience with Endpoint Detection and Response (EDR) evasion in a Multifactor Authentication (MFA) environment

  • Experience with common Penetration testing and Red Team Tools, including Mythic Cobalt Strike or Sliver, and how they work

  • Experience with Command-and-Control channel frameworks, offensive infrastructure deployment, Cloud technologies, reverse engineering malware, data obfuscation or encryption, Active Directory exploitation, and authentication-type technologies

  • Experience working in a Windows environment and with Active Directory attack path enumeration

  • Experience with OPSEC-focused infrastructure implementation, including Docker, Redirectors, or Mail Servers, and exploit development in Windows and Linux environments

  • Ability to obtain and maintain a Public Trust or Suitability/Fitness determination based on client requirements

  • Bachelor's degree in CS, IT, or Engineering

Additional Qualifications:

  • Experience with wireless and Radio Frequency technologies, including Bluetooth or 802.11

  • Experience with scripting and editing existing code and programming in C#, C++, Python, or GO

  • Experience with Rapid Development of offensive-focused tooling and tradecraft

  • Experience with phishing and other so cia l engineering tactics

  • Experience with assembly languages, including x86 or reverse engineering

Vetting:

Applicants selected will be subject to a government investigation and may need to meet eligibility requirements of the U.S. government client .

Compensation

At Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well-being. Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care. Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values. Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen’s benefit programs. Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits. We encourage you to learn more about our total benefits by visiting the Resource page on our Careers site and reviewing Our Employee Benefits page.

Salary at Booz Allen is determined by various factors, including but not limited to location, the individual’s particular combination of education, knowledge, skills, competencies, and experience, as well as contract-specific affordability and organizational requirements. The projected compensation range for this position is $86,800.00 to $198,000.00 (annualized USD). The estimate displayed represents the typical salary range for this position and is just one component of Booz Allen’s total compensation package for employees. This posting will close within 90 days from the Posting Date.

Identity Statement

As part of the application process, you are expected to be on camera during interviews and assessments. We reserve the right to take your picture to verify your identity and prevent fraud.

Work Model
Our people-first culture prioritizes the benefits of flexibility and collaboration, whether that happens in person or remotely.

  • If this position is listed as remote or hybrid, you’ll periodically work from a Booz Allen or client site facility.
  • If this position is listed as onsite, you’ll work with colleagues and clients in person, as needed for the specific role.

Commitment to Non-Discrimination

All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, local, or international law.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Red Team Operations Lead

Booz Allen Hamilton

McLean

Hybrid

USD 86,000 - 198,000

30+ days ago

Red Team Operations Lead

Booz Allen Hamilton

Baltimore

Hybrid

USD 86,000 - 198,000

30+ days ago