×
Register Here to Apply for Jobs or Post Jobs. X

Intermediate Red Team Operator Security Clearance

Job in Norfolk, Virginia, 23501, USA
Listing for: Intelligent Waves LLC
Full Time position
Listed on 2026-02-11
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer, Network Security, Systems Analyst
Job Description & How to Apply Below
Position: Intermediate Red Team Operator with Security Clearance
Overview Intelligent Waves is seeking an Intermediate Red Team Operator to support U.S. Navy acquisition and operational programs. This role supports cyber Operational Test and Evaluation (OT&E) activities across a diverse set of Navy platforms, weapon systems, information warfare capabilities, and enterprise business systems. The operator will assist in the development of cyber OT&E test plans, execute authorized cyber testing activities, and produce detailed reports documenting test results and findings.

Testing will be conducted across live operational environments, laboratories, cyber ranges, and cloud-based services, encompassing both information technology (IT) and operational technology (OT) systems. System safety and operational security are critical priorities in all test environments. The role involves leveraging approved tools, resources, and analytic techniques to penetrate and access systems and networks under test in support of mission objectives.

The operator will perform testing under the direction of the OID Current Operations Officer and apply established red team tradecraft in accordance with defined rules of engagement.
** This position is contingent upon final contract and funding approval.

Location:

Norfolk, VA
✈️ Travel:
None ️ Clearance Requirement: TS/SCI Intelligent Waves delivers mission-focused multi-domain operational expertise and innovation to the Government through high-impact technology solutions in cybersecurity, data science, enterprise network & systems engineering, software development, and cognitive human performance. ANYTIME. ANYWHERE. ANY DOMAIN. Since 2006, we have proudly served federal agencies including the Department of Defense. Our ability to operate globally in a wide range of environments, coupled with our deep understanding of customer needs and requirements, enables us to provide cost-effective solutions to support the most complex missions.

Adherence to all customer site protocols is mandatory for employees. Responsibilities Planning & Analysis
* Conduct system and open-source research to identify mission context, architecture, attack surfaces, and threat vectors.

* Analyze adversary cyber actors, including TTPs and capabilities, and integrate findings into test planning.

* Support development and validation of technically feasible and operationally relevant test objectives.
Operations & Execution
* Develop and execute penetration testing and red team tactics, techniques, and procedures aligned to approved objectives.

* Prepare, deploy, and operate red team test assets during cyber test events.

* Execute vulnerability assessments, adversarial assessments, and cyber tabletop exercises.
Test Preparation & Coordination
* Participate in pre-test coordination activities, including planning meetings, site visits, and technical in-briefs.

* Present system and threat research to the red team prior to execution and maintain test libraries.

* Coordinate operational requirements for the acquisition and authorization of cyber tools and capabilities.
Reporting, Compliance & Professional Development
* Document test results, deficiencies, risks, and lessons learned in support of post-test analysis.

* Maintain required documentation to support DCAT authorization in accordance with DoDI 8585.01.

* Participate in capture-the-flag events and technical exchange forums to sustain red team proficiency.
Qualifications
* Clearance Requirement: TS/SCI
* Offensive Security Certified Professional (OSCP) or an equivalent offensive security certification.

* Minimum of three years of professional experience performing penetration testing, red team operations, and or exploitation development.

* Demonstrated proficiency with common offensive security tools, including Metasploit, Cobalt Strike, Core Impact, Burp Suite, Nessus, and Sharp Hound.

* Strong ability to identify and analyze malicious program behavior using dynamic analysis techniques.

* Proven capability to independently plan and execute penetration testing and red team activities to successfully meet assigned test objectives.

* In-depth understanding of Windows and Unix/Linux system internals, host-based security products, and…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary