Red Team Operator, Senior

Key Role:

Work with a wide variety of clients, including Fortune 100 companies, to validate security controls and incident response through offensive security operations, including Red and Purple Teaming. Interface directly with client leadership and technical security staff to lead Red and Purple team engagements in a wide variety of scenarios ranging from phishing based initial access to OT ICS network perimeter and egress testing. Work with a team of 10+ seasoned security testing professionals to enhance existing services offerings and security testing capabilities and conduct hands on technical testing focused on detection and response that necessitates continuously customized tooling to avoid AV, EDR, and other protection technologies. Conduct full exploitation and leveraging of access within multiple environments, including complex Active Directory and mixed Windows and nix environment. Develop comprehensive and accurate reports and presentations for both technical and executive audiences. Identify and communicate findings and strategy effectively to client stakeholders, including technical staff, executive leadership, and legal counsel. Apply security testing and penetration testing techniques and mindset to a wide range of projects, become part of a team of security enthusiasts that perform cutting-edge research, and promote an environment of innovation and knowledge-sharing. This position is open to remote delivery anywhere within the U.S., to include the District of Columbia.

Basic Qualifications:

  • 5+ years of experience with conducting offensive security testing

  • Experience with conducting Red or Purple teaming exercises

  • Experience with using, administering, and troubleshooting, including Kali and Ubuntu as an attack platform

  • Experience working in a Windows environment and with Active Directory attack path enumeration

  • Experience with social engineering tactics, including phishing

  • Experience with scripting and editing existing code and programming, including Python, Bash, C, C++, .NET, or Java

  • Experience with developing, extending, or modifying exploits, shellcode, or exploit tools

  • Experience with C2 frameworks, including Cobalt Strike, Covenant, or Sliver

  • Knowledge of network vulnerability assessments, Web application security testing, network penetration testing, red teaming, security operations, or hunt

  • Bachelor’s degree

Additional Qualifications:

  • Experience with working in a commercial consulting or professional services environment

  • Experience with assembly languages, including x86 or reverse engineering

  • Experience deploying attacker infrastructure in cloud environments

  • Experience in network penetration testing and manipulation of network infrastructure.

  • Experience in mobile or web application assessments.

The proposed salary range for this position in Colorado is 110,000 to 150,000. Final salary will be determined based on various factors.

At Booz Allen, we celebrate your contributions, provide you with opportunities and choice, and support your total well-being. Our comprehensive benefit offerings include healthcare, retirement plan, insurance programs, commuter program, employee assistance program, paid and unpaid leave programs, education assistance, and childcare benefits.

We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.

#LI-AH1, #LI-Remote, DH1, ID15-CMCL

Not ready to apply? Join our talent community and sign up for job alerts.