Red Cell Cyber Analyst
Listed on 2026-01-07
-
IT/Tech
Cybersecurity, Information Security
RED CELL CYBER ANALYST (Operational Position)
The Red Cell Cyber Analyst assumes all cyber advisory responsibility for the Red Team. The Red Cell Cyber Analyst works as needed with Red Cell Program Leads. This will include supporting adversarial cyber information for program objectives, identifying gaps in cyber architecture, and developing cyber emulative courses of action pertaining to vulnerability assessment. The Red Cell Cyber Analyst is responsible for providing advice to tactical partner elements and Red Team personnel in planning adversarial Cyber Warfare activities.
He/She reports directly to the Red Team Analysis and Production Manager but directly fulfills requirements for the Red Cell Program Leader. The Red Cell Program Leader is responsible overall for the team’s ability to meet or exceed contractual obligations in terms of quality and timeliness.
The Red Cell Cyber Analyst is responsible for providing advisory support concerning computer (network and infrastructure) analysis to enable Adversarial Cyber and/or Electronic Warfare Operations to an evolving Defense Threat Reduction Agency, Nuclear Enterprise, Mission Assurance Red or DoD Red Team.
The Red Cell Cyber Analyst will perform duties as the core subject matter expert (SME) in cyber red team analysis in a variety of complex data topics related to various threats. As required, the Red Cell Cyber Analyst will deploy in direct support of specific vulnerability assessments to provide local SME advisory.
Responsibilities/Tasks
The Red Cell Cyber Analyst shall:
- Characterize the adversary’s cyber capabilities. Research the structure, ideology, intentions, tactics, and capabilities of adversarial cyber organizations to develop threat characterization using a combination of both classified and unclassified sources.
- Contribute constructively to cyber threat emulation. Identify information requirements, develop assessment cyber strategies and assist Red Team Program Leader collection plans, identify information sources, and develop and conduct research of publicly available information (PAI) in order to determine adversary cyber courses of action and relevant information requirements (IR).
- Identify, map, and plan potential exploitation for key telecommunications networks.
- Analyze and characterize cyber systems and conduct analysis appropriate to the program, identify essential functions/tasks and critical assets necessary to perform them as determined by the program leader.
- Contribute to developing cyber adversary courses of action (CoA). Develop courses of action that a cyber adversary might employ against customer personnel, equipment, facilities, networks, information and information systems, infrastructure, and supply chains. Identify critical nodes/links or other targets and the effects of other environmental characteristics on course of action development.
- Facilitate timely information management flow from DoD Red Team partner elements and other entities supporting DoD Red Team operations.
- Support field assessments from a cyber adversary perspective.
- Synthesize findings to support vulnerability identification, course of action development, protection studies, trend analyses, risk analysis, and mitigation strategies.
- Develop a comprehensive understanding of the cyber implications of vulnerabilities discovered and fuse those findings with the systems analysis and determine impacts to the national and military missions they support.
- Prepare activity reports including out briefs, senior leader briefs, and interim progress reports (IPRs) and briefs, white papers, after action reviews, final reports, risk analysis products, and other documents necessary to convey assessment findings to customers, partners, and other stakeholders.
- Be able to explain network/system mechanisms to analysts and ground element in order to facilitate better analysis and operations.
- Should have a diverse understanding of network and information security operations, network exploitation, and telecommunications.
- Perform regular updates of existing Playbooks based on changes in the Threat Landscape or upon discovery of new threat tactics or procedures.
Required…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).