Booz Allen Hamilton
Red Team Operator
Booz Allen Hamilton, Mc Lean, Virginia, us, 22107
Your growth matters to us - explore our career development opportunities.A PLACE WHERE YOU BELONG
Bring your whole self to work in our culture of respect and inclusivity.SUPPORT YOUR WELLBEING
Learn how we’ll support you as you pursue a balanced, fulfilling life.YOUR CANDIDATE JOURNEY
Discover what to expect during your journey as a candidate with us.Operate as a member of a Red Team as a Red Team Operator, c ond ucting advanced adversary emulation operations against real-world targets in varying environments, and against active network defenders. Work with a small team through the design, development, and decision-making in the execution of Red Team operations. Ensure that operations complete objectives within the designated timeline and status is communicated to leadership on a regular basis, and develop comprehensive and accurate reports and presentations for both te chn ical and executive audiences. Assist in ensuring the post operations te chn ical report and support activities are completed within the required timeline. Develop scenarios and artifacts that mimic real-world adversary groups for simulated testing. Work with the team to improve team tradecraft, te chn iques, tactics, procedures, infrastructure, and tooling.Basic Qualifications:5+ years of experience with cybersecurity1+ years of experience with offensive focused use of Red Teaming, Purple Teaming, Penetration Testing, or tool developmentExperience with hands-on keyboard during multiple Red Team e nga gementsExperience c ond ucting Red or Purple teaming exercisesExperience with OPSEC-focused infrastructure implementation such as Docker, Redirectors, Mail Servers, and exploit development, in Windows and Linux environmentsKnowledge of common penetration testing and Red Team tools such as Burp Suite, CobaltStrike, Kali Linux, and Open-Source Hacking ToolsKnowledge of Command-and-Control channel frameworks, offensive infrastructure deployment, cloud te chn ologies, reverse engineering malware, data obfuscation and encryption, Active Directory, and authentication-type te chn ologiesKnowledge of Red Teaming Methodology such as Recon, Exploitation, Persistence, Lateral Movement, Post Exploitation, and ExfiltrationAbility to obtain and maintain a Public Trust or Suitability/Fitness determination based on client requirementsHS diploma or GEDAdditional Qualifications:Experience with wireless and Radio Frequency te chn ologies such as Bluetooth and 802.11Experience with Rapid Development of offensive-focused tooling and tradecraftExperience with phishing and other so cia l engineering tacticsExperience with assembly languages, including x86 or reverse engineeringBachelor's degree in CS, IT, or EngineeringAbility to obtain Offensive Security Certification such as OSWP, OSCP, OSCE, OSWE, or SANS Certifications, including GAWN, GPEN, or GXPN Certification, within 12 months of hire dateVetting:Applicants selected will be subject to a government investigation and may need to meet eligibility requirements of the U.S. government client .CompensationAt Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well-being. Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care. Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values. Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen’s benefit programs. Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits. We encourage you to learn more about our total benefits by visiting the Resource page on our Careers site and reviewing Our Employee Benefits page.Salary at Booz Allen is determined by various factors, including but not limited to location, the individual’s particular combination of education, knowledge, skills, competencies, and experience, as well as contract-specific affordability and organizational requirements. The projected compensation range for this position is $60,400.00 to $137,000.00 (annualized USD). The estimate displayed represents the typical salary range for this position and is just one component of Booz Allen’s total compensation package for employees. This posting will close within 90 days from the Posting Date. Red Team Operator
Key Role:Operate as a member of a Red Team as a Red Team Operator, c ond ucting advanced adversary emulation operations against real-world targets in varying environments, and against active network defenders. Work with a small team through the design, development, and decision-making in the execution of Red Team operations. Ensure that operations complete objectives within the designated timeline and status is communicated to leadership on a regular basis, and develop comprehensive and accurate reports and presentations for both te chn ical and executive audiences. Assist in ensuring the post operations te chn ical report and support activities are completed within the required timeline. Develop scenarios and artifacts that mimic real-world adversary groups for simulated testing. Work with the team to improve team tradecraft, te chn iques, tactics, procedures, infrastructure, and tooling.Basic Qualifications:5+ years of experience with cybersecurity1+ years of experience with offensive focused use of Red Teaming, Purple Teaming, Penetration Testing, or tool developmentExperience with hands-on keyboard during multiple Red Team e nga gementsExperience c ond ucting Red or Purple teaming exercisesExperience with OPSEC-focused infrastructure implementation such as Docker, Redirectors, Mail Servers, and exploit development, in Windows and Linux environmentsKnowledge of common penetration testing and Red Team tools such as Burp Suite, CobaltStrike, Kali Linux, and Open-Source Hacking ToolsKnowledge of Command-and-Control channel frameworks, offensive infrastructure deployment, cloud te chn ologies, reverse engineering malware, data obfuscation and encryption, Active Directory, and authentication-type te chn ologiesKnowledge of Red Teaming Methodology such as Recon, Exploitation, Persistence, Lateral Movement, Post Exploitation, and ExfiltrationAbility to obtain and maintain a Public Trust or Suitability/Fitness determination based on client requirementsHS diploma or GEDAdditional Qualifications:Experience with wireless and Radio Frequency te chn ologies such as Bluetooth and 802.11Experience with Rapid Development of offensive-focused tooling and tradecraftExperience with phishing and other so cia l engineering tacticsExperience with assembly languages, including x86 or reverse engineeringBachelor's degree in CS, IT, or EngineeringAbility to obtain Offensive Security Certification such as OSWP, OSCP, OSCE, OSWE, or SANS Certifications, including GAWN, GPEN, or GXPN Certification, within 12 months of hire dateVetting:Applicants selected will be subject to a government investigation and may need to meet eligibility requirements of the U.S. government client .CompensationAt Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well-being. Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care. Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values. Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen’s benefit programs. Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits. We encourage you to learn more about our total benefits by visiting the Resource page on our Careers site and reviewing Our Employee Benefits page.Salary at Booz Allen is determined by various factors, including but not limited to location, the individual’s particular combination of education, knowledge, skills, competencies, and experience, as well as contract-specific affordability and organizational requirements. The projected compensation range for this position is $60,400.00 to $137,000.00 (annualized USD). The estimate displayed represents the typical salary range for this position and is just one component of Booz Allen’s total compensation package for employees. This posting will close within 90 days from the Posting Date.
Identity StatementAs part of the application process, you are expected to be on camera during interviews and assessments. We reserve the right to take your picture to verify your identity and prevent fraud.Work ModelOur people-first culture prioritizes the benefits of flexibility and collaboration, whether that happens in person or remotely.If this position is listed as remote or hybrid, you’ll periodically work from a Booz Allen or client site facility.If this position is listed as onsite, you’ll work with colleagues and clients in person, as needed for the specific role.EEO CommitmentWe’re an equal employment opportunity/affirmative action employer that empowers our people to fearlessly drive change – no matter their race, color, ethnicity, religion, sex (including pregnancy, childbirth, lactation, or related medical conditions), national origin, ancestry, age, marital status, sexual orientation, gender identity and expression, disability, veteran status, military or uniformed service member status, genetic information, or any other status protected by applicable federal, state, local, or international law.
#J-18808-Ljbffr
Bring your whole self to work in our culture of respect and inclusivity.SUPPORT YOUR WELLBEING
Learn how we’ll support you as you pursue a balanced, fulfilling life.YOUR CANDIDATE JOURNEY
Discover what to expect during your journey as a candidate with us.Operate as a member of a Red Team as a Red Team Operator, c ond ucting advanced adversary emulation operations against real-world targets in varying environments, and against active network defenders. Work with a small team through the design, development, and decision-making in the execution of Red Team operations. Ensure that operations complete objectives within the designated timeline and status is communicated to leadership on a regular basis, and develop comprehensive and accurate reports and presentations for both te chn ical and executive audiences. Assist in ensuring the post operations te chn ical report and support activities are completed within the required timeline. Develop scenarios and artifacts that mimic real-world adversary groups for simulated testing. Work with the team to improve team tradecraft, te chn iques, tactics, procedures, infrastructure, and tooling.Basic Qualifications:5+ years of experience with cybersecurity1+ years of experience with offensive focused use of Red Teaming, Purple Teaming, Penetration Testing, or tool developmentExperience with hands-on keyboard during multiple Red Team e nga gementsExperience c ond ucting Red or Purple teaming exercisesExperience with OPSEC-focused infrastructure implementation such as Docker, Redirectors, Mail Servers, and exploit development, in Windows and Linux environmentsKnowledge of common penetration testing and Red Team tools such as Burp Suite, CobaltStrike, Kali Linux, and Open-Source Hacking ToolsKnowledge of Command-and-Control channel frameworks, offensive infrastructure deployment, cloud te chn ologies, reverse engineering malware, data obfuscation and encryption, Active Directory, and authentication-type te chn ologiesKnowledge of Red Teaming Methodology such as Recon, Exploitation, Persistence, Lateral Movement, Post Exploitation, and ExfiltrationAbility to obtain and maintain a Public Trust or Suitability/Fitness determination based on client requirementsHS diploma or GEDAdditional Qualifications:Experience with wireless and Radio Frequency te chn ologies such as Bluetooth and 802.11Experience with Rapid Development of offensive-focused tooling and tradecraftExperience with phishing and other so cia l engineering tacticsExperience with assembly languages, including x86 or reverse engineeringBachelor's degree in CS, IT, or EngineeringAbility to obtain Offensive Security Certification such as OSWP, OSCP, OSCE, OSWE, or SANS Certifications, including GAWN, GPEN, or GXPN Certification, within 12 months of hire dateVetting:Applicants selected will be subject to a government investigation and may need to meet eligibility requirements of the U.S. government client .CompensationAt Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well-being. Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care. Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values. Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen’s benefit programs. Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits. We encourage you to learn more about our total benefits by visiting the Resource page on our Careers site and reviewing Our Employee Benefits page.Salary at Booz Allen is determined by various factors, including but not limited to location, the individual’s particular combination of education, knowledge, skills, competencies, and experience, as well as contract-specific affordability and organizational requirements. The projected compensation range for this position is $60,400.00 to $137,000.00 (annualized USD). The estimate displayed represents the typical salary range for this position and is just one component of Booz Allen’s total compensation package for employees. This posting will close within 90 days from the Posting Date. Red Team Operator
Key Role:Operate as a member of a Red Team as a Red Team Operator, c ond ucting advanced adversary emulation operations against real-world targets in varying environments, and against active network defenders. Work with a small team through the design, development, and decision-making in the execution of Red Team operations. Ensure that operations complete objectives within the designated timeline and status is communicated to leadership on a regular basis, and develop comprehensive and accurate reports and presentations for both te chn ical and executive audiences. Assist in ensuring the post operations te chn ical report and support activities are completed within the required timeline. Develop scenarios and artifacts that mimic real-world adversary groups for simulated testing. Work with the team to improve team tradecraft, te chn iques, tactics, procedures, infrastructure, and tooling.Basic Qualifications:5+ years of experience with cybersecurity1+ years of experience with offensive focused use of Red Teaming, Purple Teaming, Penetration Testing, or tool developmentExperience with hands-on keyboard during multiple Red Team e nga gementsExperience c ond ucting Red or Purple teaming exercisesExperience with OPSEC-focused infrastructure implementation such as Docker, Redirectors, Mail Servers, and exploit development, in Windows and Linux environmentsKnowledge of common penetration testing and Red Team tools such as Burp Suite, CobaltStrike, Kali Linux, and Open-Source Hacking ToolsKnowledge of Command-and-Control channel frameworks, offensive infrastructure deployment, cloud te chn ologies, reverse engineering malware, data obfuscation and encryption, Active Directory, and authentication-type te chn ologiesKnowledge of Red Teaming Methodology such as Recon, Exploitation, Persistence, Lateral Movement, Post Exploitation, and ExfiltrationAbility to obtain and maintain a Public Trust or Suitability/Fitness determination based on client requirementsHS diploma or GEDAdditional Qualifications:Experience with wireless and Radio Frequency te chn ologies such as Bluetooth and 802.11Experience with Rapid Development of offensive-focused tooling and tradecraftExperience with phishing and other so cia l engineering tacticsExperience with assembly languages, including x86 or reverse engineeringBachelor's degree in CS, IT, or EngineeringAbility to obtain Offensive Security Certification such as OSWP, OSCP, OSCE, OSWE, or SANS Certifications, including GAWN, GPEN, or GXPN Certification, within 12 months of hire dateVetting:Applicants selected will be subject to a government investigation and may need to meet eligibility requirements of the U.S. government client .CompensationAt Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well-being. Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care. Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values. Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen’s benefit programs. Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits. We encourage you to learn more about our total benefits by visiting the Resource page on our Careers site and reviewing Our Employee Benefits page.Salary at Booz Allen is determined by various factors, including but not limited to location, the individual’s particular combination of education, knowledge, skills, competencies, and experience, as well as contract-specific affordability and organizational requirements. The projected compensation range for this position is $60,400.00 to $137,000.00 (annualized USD). The estimate displayed represents the typical salary range for this position and is just one component of Booz Allen’s total compensation package for employees. This posting will close within 90 days from the Posting Date.
Identity StatementAs part of the application process, you are expected to be on camera during interviews and assessments. We reserve the right to take your picture to verify your identity and prevent fraud.Work ModelOur people-first culture prioritizes the benefits of flexibility and collaboration, whether that happens in person or remotely.If this position is listed as remote or hybrid, you’ll periodically work from a Booz Allen or client site facility.If this position is listed as onsite, you’ll work with colleagues and clients in person, as needed for the specific role.EEO CommitmentWe’re an equal employment opportunity/affirmative action employer that empowers our people to fearlessly drive change – no matter their race, color, ethnicity, religion, sex (including pregnancy, childbirth, lactation, or related medical conditions), national origin, ancestry, age, marital status, sexual orientation, gender identity and expression, disability, veteran status, military or uniformed service member status, genetic information, or any other status protected by applicable federal, state, local, or international law.
#J-18808-Ljbffr