×
Register Here to Apply for Jobs or Post Jobs. X

Red Analyst; Cyber

Job in Fort Belvoir, Fairfax County, Virginia, 22060, USA
Listing for: K2 Group, Inc.
Full Time position
Listed on 2026-01-03
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Job Description & How to Apply Below
Position: Red Analyst (Cyber)

Red Analyst (Cyber)

Red Team Analysts (cyber) are responsible for providing direct strategic and tactical analytic support to the DoD Red Team. The Red Analysts (cyber) drive the strategic direction of cyber operations by selecting cyber targets and identifying cyber enabling actions from an adversary perspective. The Red Analysts (cyber) are responsible for the management, communication, and presentation of information gathered to team members, partner organizations, customers, and external parties.

The Red Analysts (cyber) must exhibit initiative, creativity, an ability to operate in an analytically flat organization, and operate within a culture of professionalism and respect with peers, operational teams, and customers.

The Red Analysts (cyber) are responsible for providing advisory support concerning computer (network and infrastructure) analysis to enable Adversarial Cyber and/or Electronic Warfare Operations to support an evolving DoD Red Team.

The Red Analysts (cyber) act as subject matter experts on a variety of complex topics related to a variety of cyber threats. As required the Red Analysts (cyber) travel domestically and abroad to provide expert expertise and direct support of geographically separate vulnerability assessments. Specifically, the Red Analysts (cyber) are responsible for researching and identifying positions, access points, relationships, organizations, and other potential vulnerabilities in support of DoD Red Team operations.

This includes identifying adversarial cyber information for program objectives, identifying gaps in cyber architecture and developing cyber courses of actions on vulnerability assessments. Further, the Red Analysts (cyber) provide advice to tactical partner elements and red team personnel in planning adversarial cyber assessments. They are also responsible for implementing specialized training, advanced analytic skills and tools, and maintaining knowledge of industry practices related to cyber red teaming.

They report directly to the Red Team Cyber Analysis Lead.

Responsibilities/Tasks
  • Characterize the adversary’s cyber capabilities. Research the structure, ideology, intentions, tactics, and capabilities of adversarial cyber organizations to develop threat characterization
  • Contribute constructively to cyber threat emulation. Identify information requirements, develop assessment cyber strategies and assist Red Team Program Leader collection plans, identify information sources, and develop and conduct research of publicly available information (PAI) in order to determine adversary cyber courses of action and relevant information requirements (IR).
  • Identify, map, and plan potential exploitations for key telecommunications networks.
  • Analyze and characterize cyber systems and conduct analysis appropriate to the program, identify essential functions/tasks and critical assets necessary to perform them as determined by the program leader.
  • Contribute constructively to cyber threat emulation. Identify information requirements, develop assessment cyber strategies and assist red team program leader collections plans, identify information sources, and develop and conduct research of publicly available information (PAI) in order to determine adversary cyber courses of action and relevant information requirements (IR)
  • Identify, map, and plan potential exploitation for key telecommunications networks.
  • Analyze and characterize cyber systems and conduct analysis appropriate to the program, identify essential functions/tasks and critical assets necessary to perform them as determined by the program leader.
  • Contribute to developing cyber adversary courses of action (CoA). Develop courses of action that a cyber adversary might employ against customer personnel and equipment facilities networks information and information systems. Identify critical nodes/links or other targets and the effects of other environmental characteristics on course of action development.
  • Support field assessments from a cyber adversary perspective. Develop a comprehensive understanding of cyber implication of vulnerabilities discovered and fuse those findings with the systems analysis and determine impacts to the national and military missions they support.
  • Provide activity reports including out briefs to senior leaders and interim progress reports and white papers, after action reviews, final reports, risk analysis products and other documents as required.
  • Perform regular updates of existing documents based on changes in the threat landscape or upon discovery of new threat tactics or procedures
Required Skills/Qualifications
  • Ability to communicate complex informational concepts or ideas in a confident and well‑organized manner through verbal, written, and visual means.
  • Ability to accurately and completely source all data used in products.
  • Ability to clearly articulate information requirements into well‑formulated research questions.
  • Ability to develop or recommend analytic approaches or solutions to problems and…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary