Red Team Operator - Advanced
**Contingent Upon Contract Award
Company Overview:
Dutch Ridge Consulting Group LLC (DRCG) a United States (US) Small Business Administration (SBA) Certified Service-Disabled Veteran-Owned Small Business (SDVOSB) and ISO 9001:2015 Certified Company was established in 2016. DRCG is 100% US owned has over 50 employees and provides high-quality support staff at ten client locations throughout the US with corporate offices in Ashburn VA and Beaver PA. DRCG delivers expertise in Cybersecurity Engineering and Operations; Cyber Threat Intelligence; Insider Threat Prevention and Detection; Information Technology Solutioning; Systems Integration; Program Management; Policy Planning Communications and Compliance Support; Workflow Solutioning; Risk Management; Business Process Reengineering; and Professional Business Consulting Services. DRCGs technical approach optimizes client investments by leveraging expertise in managing growth and transformation of existing IT environments.
Assist in the development of cyber OT&E test plans execute cyber tests in support of Navy acquisition systems and report cyber test results. Conduct cyber tests on a wide range of systems comprised of information technology and operational technology supporting US Navy platforms weapon systems information warfare and business systems/services in live operational environments laboratories cyber ranges and cloud-based services; system safety and operational security is paramount in all environments. Leverage all authorized resources and analytic techniques to penetrate/access targeted networks and systems under test in support of cyber OT&E mission. Perform these duties under the supervision of the 01D Current Operations Officer. Provide expertise in penetration testing and DoD and DoN red team operations. Review cyber test requirements for each system under test and research and coordinate with other DoD organizations academia private sector and defense Contractors on cyber capabilities and tools to meet the test requirements. Make recommendations to the Government on the test objectives and capabilities to meet current and future test requirements. Coordinate with red team operators and exploitation analysts to implement/integrate the Government determined solutions including new tools lab/range use and external resource support.
Duties and Responsibilities:
- Review and become proficient in cyber T&E concept of operations SOPs policies and guidance.
- Maintain and participate in the development of 01D SOPs and documentation for DCAT authorization established in DoDI 8585.01.
- Research review prioritize and submit operational requirements for acquisition of equipment or cyber capabilities following the 01D tool approval process.
- Support development and execution of TTPs for penetration testing or Red Teaming.
- Research adversary cyber actors TTPs organizational structures capabilities personas and environments and integrate findings into cyber survivability test planning and execution.
- Participate in Cyber Test planning:
- Conduct open-source research and system under test documentation review to familiarize with the systems mission architecture and interfaces including critical components to identify its attack surface and threat vectors
- Participate in checkpoint meetings
- Guide development of test plan objectives
- Review test plans ensuring that test plans objectives are feasible
- Participate in test planning site visits
- Participate in test preparation:
- Participate in site pre-test coordination visits. Support in-brief to the test site.
- Lead red team test plan review
- Add relevant system technical information to test reference library
- Organize and lead research presentations for advanced capability development in support of future tests
- Prepare test assets (Government Furnished)
- Execute test events including Cooperative Vulnerability Penetration Assessments Adversarial Assessments and Cyber Tabletops in support of Operational Testing Developmental Testing risk reduction events or other events as assigned.
- Use provided and NAO approved commercial and open-source network cyber assessment tools (e.g. Core Impact Nmap Burp Metasploit and Nessus).
- Employee ethical hacking expertise to exploit discovered vulnerabilities and misconfigurations associated with but not limited to operating systems (Windows Linux etc.) protocols (HTTP FTP etc.) and network security services (PKI HTTPS etc.) to accomplish test objectives
- Be able to accomplish testing independently and provide direction to basic and intermediate operators
- Ensure tests are conducted safely in accordance with the test plan and policies are adhered to.
- Follow Joint Forces Headquarters (JFHQ)-DODIN deconfliction procedures
- Verify collected data for accuracy and completeness.
- Participate in the post-test iterative process including generation of documents (e.g. deficiency/risk sheets)
- Document lessons learned.
- Participate in capture the flag events cyber off sites external engagements such as red team huddles and red team technical exchange meetings; develop required products and materials in support of these events.
- Generate and update documentation to maintain DCAT authorization compliance per DoDI 8585.0.
- Knowledge of deconfliction reporting to include external organization interaction.
- Collaborate with development organizations to create and deploy the tools needed to achieve objectives.
- Develop new techniques for gaining and keeping access to target systems.
Qualifications/Requirements:
- TS/SCI clearance
- Minimum 6 years experience performing any combination of: penetration testing red teaming or exploitation development.
- Minimum 6 years with proficiency in leading red team operators in penetration testing/red teaming to accomplish assigned test objectives.
- Offensive Security Certified Professional (OSCP) or equivalent certification
- Minimum of 3 years experience performing any combination of: penetration testing red teaming or exploitation development.
- Proficient in multiple offensive tools including:
- Metasploit
- Cobalt Strike
- Core Impact
- Burp Suite
- Nessus
- SharpHound
- Ability to detect malicious activity of a program using dynamic analysis techniques
- Independently operate to conduct penetration testing/red teaming to accomplish assigned test objectives
Job Location:
Norfolk VA 23505
DRCG LLC. is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race color religion sex national origin or any other criteria the consideration of which is made impermissible by applicable law.
Red Team Operator - Advanced **Contingent Upon Contract Award Company Overview:Dutch Ridge Consulting Group LLC (DRCG) a United States (US) Small Business Administration (SBA) Certified Service-Disabled Veteran-Owned Small Business (SDVOSB) and ISO 9001:2015 Certified Company was established in 2016...
Red Team Operator - Advanced
**Contingent Upon Contract Award
Company Overview:
Dutch Ridge Consulting Group LLC (DRCG) a United States (US) Small Business Administration (SBA) Certified Service-Disabled Veteran-Owned Small Business (SDVOSB) and ISO 9001:2015 Certified Company was established in 2016. DRCG is 100% US owned has over 50 employees and provides high-quality support staff at ten client locations throughout the US with corporate offices in Ashburn VA and Beaver PA. DRCG delivers expertise in Cybersecurity Engineering and Operations; Cyber Threat Intelligence; Insider Threat Prevention and Detection; Information Technology Solutioning; Systems Integration; Program Management; Policy Planning Communications and Compliance Support; Workflow Solutioning; Risk Management; Business Process Reengineering; and Professional Business Consulting Services. DRCGs technical approach optimizes client investments by leveraging expertise in managing growth and transformation of existing IT environments.
Assist in the development of cyber OT&E test plans execute cyber tests in support of Navy acquisition systems and report cyber test results. Conduct cyber tests on a wide range of systems comprised of information technology and operational technology supporting US Navy platforms weapon systems information warfare and business systems/services in live operational environments laboratories cyber ranges and cloud-based services; system safety and operational security is paramount in all environments. Leverage all authorized resources and analytic techniques to penetrate/access targeted networks and systems under test in support of cyber OT&E mission. Perform these duties under the supervision of the 01D Current Operations Officer. Provide expertise in penetration testing and DoD and DoN red team operations. Review cyber test requirements for each system under test and research and coordinate with other DoD organizations academia private sector and defense Contractors on cyber capabilities and tools to meet the test requirements. Make recommendations to the Government on the test objectives and capabilities to meet current and future test requirements. Coordinate with red team operators and exploitation analysts to implement/integrate the Government determined solutions including new tools lab/range use and external resource support.
Duties and Responsibilities:
- Review and become proficient in cyber T&E concept of operations SOPs policies and guidance.
- Maintain and participate in the development of 01D SOPs and documentation for DCAT authorization established in DoDI 8585.01.
- Research review prioritize and submit operational requirements for acquisition of equipment or cyber capabilities following the 01D tool approval process.
- Support development and execution of TTPs for penetration testing or Red Teaming.
- Research adversary cyber actors TTPs organizational structures capabilities personas and environments and integrate findings into cyber survivability test planning and execution.
- Participate in Cyber Test planning:
- Conduct open-source research and system under test documentation review to familiarize with the systems mission architecture and interfaces including critical components to identify its attack surface and threat vectors
- Participate in checkpoint meetings
- Guide development of test plan objectives
- Review test plans ensuring that test plans objectives are feasible
- Participate in test planning site visits
- Participate in test preparation:
- Participate in site pre-test coordination visits. Support in-brief to the test site.
- Lead red team test plan review
- Add relevant system technical information to test reference library
- Organize and lead research presentations for advanced capability development in support of future tests
- Prepare test assets (Government Furnished)
- Execute test events including Cooperative Vulnerability Penetration Assessments Adversarial Assessments and Cyber Tabletops in support of Operational Testing Developmental Testing risk reduction events or other events as assigned.
- Use provided and NAO approved commercial and open-source network cyber assessment tools (e.g. Core Impact Nmap Burp Metasploit and Nessus).
- Employee ethical hacking expertise to exploit discovered vulnerabilities and misconfigurations associated with but not limited to operating systems (Windows Linux etc.) protocols (HTTP FTP etc.) and network security services (PKI HTTPS etc.) to accomplish test objectives
- Be able to accomplish testing independently and provide direction to basic and intermediate operators
- Ensure tests are conducted safely in accordance with the test plan and policies are adhered to.
- Follow Joint Forces Headquarters (JFHQ)-DODIN deconfliction procedures
- Verify collected data for accuracy and completeness.
- Participate in the post-test iterative process including generation of documents (e.g. deficiency/risk sheets)
- Document lessons learned.
- Participate in capture the flag events cyber off sites external engagements such as red team huddles and red team technical exchange meetings; develop required products and materials in support of these events.
- Generate and update documentation to maintain DCAT authorization compliance per DoDI 8585.0.
- Knowledge of deconfliction reporting to include external organization interaction.
- Collaborate with development organizations to create and deploy the tools needed to achieve objectives.
- Develop new techniques for gaining and keeping access to target systems.
Qualifications/Requirements:
- TS/SCI clearance
- Minimum 6 years experience performing any combination of: penetration testing red teaming or exploitation development.
- Minimum 6 years with proficiency in leading red team operators in penetration testing/red teaming to accomplish assigned test objectives.
- Offensive Security Certified Professional (OSCP) or equivalent certification
- Minimum of 3 years experience performing any combination of: penetration testing red teaming or exploitation development.
- Proficient in multiple offensive tools including:
- Metasploit
- Cobalt Strike
- Core Impact
- Burp Suite
- Nessus
- SharpHound
- Ability to detect malicious activity of a program using dynamic analysis techniques
- Independently operate to conduct penetration testing/red teaming to accomplish assigned test objectives
Job Location:
Norfolk VA 23505
DRCG LLC. is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race color religion sex national origin or any other criteria the consideration of which is made impermissible by applicable law.
View more
View less