Red Team Operator, Senior
NLD, The Hague (Wilhelmina Van Pruisenweg 104)
Booz Allen Hamilton
Using tomorrow’s technologies, Booz Allen advances the nation’s most critical civil, defense, and national security missions.Key Role:
Work with a wide variety of clients, including Fortune 100 companies, to validate security controls and incident response through offensive security operations including Red and Purple Teaming. Interface directly with client leadership and technical security staff to lead Red and Purple team engagements in a wide variety of scenarios ranging from phishing-based initial access to OT or ICS network perimeter and egress testing. Work with a team of 10+ seasoned security testing professionals to enhance existing service offerings and security testing capabilities and conduct hands-on technical testing focused on detection and response that necessitates continuously customized tooling to avoid AV, EDR, and other protection technologies. Conduct full exploitation and leveraging of access within multiple environments, including complex Active Directory and mixed Windows and nix environment. Develop comprehensive and accurate reports and presentations for both technical and executive audiences. Communicate findings and strategy effectively to client stakeholders, including technical staff, executive leadership, and legal counsel. Apply security testing and penetration testing techniques and mindset to a wide range of projects. Act as the primary interface and lead for small red teams ranging from 1-3 additional testers and manage the delivery of staff assignments, as needed. Become part of a team of security enthusiasts that perform cutting-edge research and promote an environment of innovation and knowledge-sharing.
Basic Qualifications:
Experience with using, administering, and troubleshooting, including Linux and Ubuntu
Experience scripting and editing existing code and programming, including Perl, Python, Ruby, Bash, C/C++, C#, or Java
Experience developing, extending, or modifying exploits, shellcode, or exploit tools to evade common EDRs
Experience with security assessment tools, including Nessus, Accunetix, Metasploit, Burp Suite Pro, Cobalt Strike, Sliver, Havoc, or Covenant
Experience with Amazon cloud environments and its major technologies such as IAM, EC2, VPC, EBS, S3, and Lambda
Experience working in a Windows environment and with Active Directory
Knowledge of network vulnerability assessments, Web application security testing, network penetration testing, red teaming, security operations, or hunt
Knowledge of open security testing standards and projects, including OWASP and ATT&CK
Ability to present technical findings to both technical and non-technical audiences
Bachelor’s degree
Additional Qualifications:
5+ years of experience in offensive security testing such as Web application security testing, network penetration testing, red teaming, or purple teaming
Experience with working in a commercial consulting or professional services environment
Experience with phishing and other social engineering tactics
Experience with assembly languages, including x86 or reverse engineering
Experience with hardware reverse engineering using JTAG or UART
Experience with Terraform or similar automation technologies
Experience with physical security assessments, including the use of proxmark3 or similar proximity card spoofing or copying devices
Bachelor’s degree in Computer Engineering, CS, or a related field
Ability to obtain Offensive Security Certification, including OSWP, OSCP, OSCE, OSWE, SANS, GAWN, GPEN, or GXPN Certification within one year of hire date
EEO Commitment
We’re an equal employment opportunity/affirmative action employer that empowers our people to fearlessly drive change – no matter their race, color, ethnicity, religion, sex (including pregnancy, childbirth, lactation, or related medical conditions), national origin, ancestry, age, marital status, sexual orientation, gender identity and expression, disability, veteran status, military or uniformed service member status, genetic information, or any other status protected by applicable federal, state, local, or international law.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory Application security Automation Bash Burp Suite C Cloud Cobalt Strike EC2 EDR Exploit Exploits GPEN GXPN IAM ICS Incident response Java Lambda Linux Metasploit Nessus Offensive security OSCE OSCP OSWE OSWP OWASP Pentesting Perl Python Red team Reverse engineering Ruby S3 SANS Scripting Security assessment Strategy Terraform Ubuntu Windows
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.