Red Analyst (Cyber)
Red Analyst (Cyber)
Red Team Analysts (cyber) are responsible for providing direct strategic and tactical analytic support to the DoD Red Team . The Red Analysts (cyber) drive the strategic direction of cyber operations by selecting cyber targets and identifying cyber enabling actions from an adversary perspective. The Red Analysts (cyber) are responsible for the management, communication, and presentation of information gathered to team members, partner organizations, customers, and external parties. The Red Analysts (cyber) must exhibit initiative, creativity, an ability to operate in an analytically flat organization , and operate within a culture of professionalism and respect with peers, operational teams, and customers.The Red Analysts (cyber) are responsible for providing advisory support concerning computer (network and infrastructure) analysis to enable Adversarial Cyber and/or Electronic Warfare Operations to support an evolving DoD Red Team. The Red Analysts (cyber) act as subject matter experts on a variety of complex topics related to a variety of cyber threats. As required the Red Analysts (cyber) travel domestically and abroad to provide expert expertise and direct support of geographically separate vulnerability assessments.
Specifically, the Red Analysts (cyber) are responsible for researching and identifying positions, access points, relationships, organizations, and other potential vulnerabilities in support of DoD Red Team operations. This includes identifying adversarial cyber information for program objectives, identifying gaps in cyber architecture and developing cyber courses of actions on vulnerability assessments. Further, the Red Analysts (cyber) provide advice to tactical partner elements and red team personnel in planning adversarial cyber assessments. They are also responsible for implementing specialized training, advanced analytic skills and tools, and maintaining knowledge of industry practices related to cyber red teaming. They report directly to the Red Team Cyber Analysis Lead. Responsibilities/Tasks
The Red Analyst (Cyber) shall:
- Characterize the adversary’s cyber capabilities. Research the structure, ideology, intentions, tactics, and capabilities of adversarial cyber organizations to develop threat characterization
- Contribute constructively to cyber threat emulation. Identify information requirements, develop assessment cyber strategies and assist Red Team Program Leader collection plans, identify information sources, and develop and conduct research of publicly available information (PAI) in order to determine adversary cyber courses of action and relevant information requirements (IR).
- Identify, map, and plan potential exploitations for key telecommunications networks.
- Analyze and characterize cyber systems and conduct analysis appropriate to the program, identify essential functions/tasks and critical assets necessary to perform them as determined by the program leader.
- Contribute constructively to cyber threat emulation. Identify information requirements, develop assessment cyber strategies and assist red team program leader collections plans, identify information sources, and develop and conduct research of publicly available information (PAI) in order to determine adversary cyber courses of action and relevant information requirements (IR)
- Identify, map, and plan potential exploitation for key telecommunications networks.
- Analyze and characterize cyber systems and conduct analysis appropriate to the program, identify essential functions/tasks and critical assets necessary to perform them as determined by the program leader.
- Contribute to developing cyber adversary courses of action ( CoA). Develop courses of action that a cyber adversary might employ against customer personnel and equipment facilities networks information and information systems. Identify critical nodes/links or other targets and the effects of other environmental characteristics on course of action development.
- Support field assessments from a cyber adversary perspective develop a comprehensive understanding of cyber implication of vulnerabilities discovered and fuse those finding with the systems analysis and determine impacts to the national and military missions they support.
- Provide activity reports including out briefs to senior leaders and interim progress reports and white papers, after action reviews, final reports, risk analysis products and other documents as required.
- Perform regular updates of existing documents based on changes in the threat landscape or upon discovery of new threat tactics or procedures
- Ability to communicate complex informational concepts or ideas in a confident and well -organized manner through verbal written and visual means.
- Ability to accurately and completely source all data used in products.
- Ability to clearly articulate information requirements in to well - formulated research questions.
- Ability to develop or recommend analytic approaches or solutions to
problems and situations for which information is incomplete or for which no precedent exists. - Demonstrated expertise performing information/data collection analysis and fusion.
- Ability to think like and emulate actions of threat actors.
- Possess a current driver's license.
- Capable of operating a rental vehicle.
- Active TS/SCI clearance required.
- U S citizenship required.
- Travel is up to 20%
- IAT level II/III
- Understand and be well versed in common cyber threat terminology, vulnerability, and penetration test principes and methodologies.
- Possess basic knowledge of cyber incident and response forensics and related current events
- Familiarity with log analysis packet analysis OSI Model, Network Architectures, NISTS DIACAPS RMFs and Information Operations threat intelligence activities including the collection of and tracking threat actors digital forensics incident response and threat hunting methodologies
- Experience performing attack analysis or Red Team penetration testing against operational computer networks including experience in Windows Security, Network Security, Linux/Unix Security, Database security, or Mainframe Security.
- Knowledge of common computer/network infections (virus, trojan, etc.) and methods of infection(ports, attachments, etc.)
- Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.)
Recommended Jobs
Tax Manager
Tax Manager - Richmond, VA Who: An experienced tax professional with strong managerial skills and expertise in pass-through entity and partnership taxation. What: Manage complex tax engagements,…
Landscape Crew Leader
The Landscaping Crew Leader at U S Lawns of Lynchburg is a full-time, hourly position in the franchise industry located in Lynchburg, Virginia. This individual contributor role is responsible for lead…
Technical Writer
The Virginia Department of Elections (ELECT) is seeking a highly skilled Technical Writer with proven experience in developing clear, concise, user-friendly documentation for complex technical produc…
GIS Analyst
Title: GIS Analyst Belong. Connect. Grow. with KBR! KBR's National Security Solutions team provides advanced engineering and technology solutions to support critical national security missi…
Specialist-Permitting Compliance (Air)/EHS Engineer (Hybrid) (Newport News, VA)
Position Description SUMMARY OF DUTIES: Opportunity for a self-starter who enjoys working independently and being part of a valuable team that is fast-paced and streamlined to address business gro…
Service Desk Lead
Location: Alexandria, VA Clearance: Secret Overview The Service Desk Lead oversees Tier I and Tier II operations, ensuring prompt, effective support to end users. This role supervises Ser…
Medical Management Specialist I
Location: This role enables associates to work virtually full-time, with the exception of required in-person training sessions, providing maximum flexibility and autonomy. This approach promotes prod…
RPA IA Developer TS/SCI with Poly REQUIRED
RPA IA Developer TS/SCI with Poly REQUIRED Position Description As the RPA Developer you'll work cross-functionally with our team of developers, data scientists, analysts, strategists, and Subj…
SAP NS2 SuccessFactors Payroll Integration Expert and ABAP Professional
We help the world run better At SAP, we keep it simple: you bring your best to us, and we'll bring out the best in you. We're builders touching over 20 industries and 80% of global commerce, and w…
Physical Technical Compliance Officer - TS/SCI w/Poly
Responsibilities for this Position Location: USA VA Chantilly Full Part/Time: Full time Job Req: RQ214209 Type of Requisition: Regular Clearance Level Must Currently Possess: T…