Intermediate Red Team Operator
Norfolk, VA
Full Time
Experienced
Position Type: Full-Time
Location: Norfolk, VA
Clearance: TS/SCI Eligibility
AERMOR is seeking an Intermediate Red Team Operator who will provide support by conducting penetration testing, vulnerability assessments, and adversarial simulations. This role requires hands-on expertise with offensive cybersecurity tools and techniques, enabling the evaluation of cybersecurity posture for Navy systems. The operator will support test planning, execution, and post-test analysis while contributing to capability development and red team readiness.
Key Responsibilities:
Required Qualifications:
Location: Norfolk, VA
Clearance: TS/SCI Eligibility
AERMOR is seeking an Intermediate Red Team Operator who will provide support by conducting penetration testing, vulnerability assessments, and adversarial simulations. This role requires hands-on expertise with offensive cybersecurity tools and techniques, enabling the evaluation of cybersecurity posture for Navy systems. The operator will support test planning, execution, and post-test analysis while contributing to capability development and red team readiness.
Key Responsibilities:
- Execute cyber assessments including Cooperative Vulnerability Penetration Assessments (CVPA), Adversarial Assessments (AA), and Cyber Tabletop Exercises (CTT).
- Utilize approved commercial and open-source red team tools such as Metasploit, Burp Suite, Core Impact, Nessus, SharpHound/BloodHound, and Cobalt Strike.
- Participate in test planning meetings and site visits to assess target architecture and identify potential attack vectors.
- Conduct open-source research and documentation review to support test objectives.
- Operate independently during test events and assist in directing Basic Red Team Operators.
- Prepare and brief in-test findings, post-test risk/deficiency sheets, and technical reports.
- Participate in red team capability development efforts and peer knowledge sharing activities (e.g., Capture the Flag events, red team exchanges).
Required Qualifications:
- Minimum 3 years of experience in penetration testing, red teaming, or exploit development.
- Offensive Security Certified Professional (OSCP) or equivalent certification.
- Proficient with multiple offensive tools and able to safely validate exploit code functionality.
- Strong experience with Windows and Linux/Unix operating systems.
Apply for this position
Required*