Demo

Intermediate Red Team Operator

GCA
Virginia, VA Full Time
POSTED ON 1/8/2026
AVAILABLE BEFORE 2/6/2026
This position is designated as an Intermediate-level Access Network Operator (DCWF Work Role 321) and is not designated as Key Personnel. The individual performs independent penetration testing and red team operations in support of OPTEVFOR Cyber Operational Test & Evaluation (OT&E) activities. The role supports cyber survivability assessments across planning, preparation, execution, and post-test phases and provides technical direction to basic-level operators when required.

Qualifications

The Intermediate Access Network Operator must meet all qualification requirements of a Basic Access Network Operator in addition to the following:

  • Offensive Security Certified Professional (OSCP) or equivalent offensive cybersecurity certification
  • Minimum of three (3) years of experience performing penetration testing, red teaming, and/or exploitation development
  • Proficiency with multiple offensive cyber tools, including:
    • Metasploit
    • Cobalt Strike
    • Core Impact
    • Burp Suite
    • Nessus
    • SharpHound
  • Demonstrated ability to detect malicious program activity using dynamic analysis techniques
  • Ability to independently plan and execute penetration testing and red team activities to accomplish assigned test objectives
Key Responsibilities

Policy, Procedures, and Tooling

  • Become proficient in OPTEVFOR Cyber T&E CONOPS, SOPs, policies, and guidance
  • Maintain and contribute to the development of 01D SOPs and technical documentation supporting DCAT authorization in accordance with DoDI 8585.01
  • Research, review, prioritize, and submit operational requirements for acquisition of cyber tools and capabilities in accordance with the 01D tool approval process
  • Support development and execution of tactics, techniques, and procedures (TTPs) for penetration testing and red team operations
  • Research adversary cyber actors’ TTPs, organizational structures, capabilities, personas, and operating environments and integrate findings into cyber survivability test planning and execution


Test Planning

  • Participate in OPTEVFOR cyber test planning activities, including:
    • Conducting open-source research and reviewing system-under-test (SUT) documentation to understand mission, architecture, interfaces, and critical components
    • Identifying attack surfaces and threat vectors
    • Participating in cyber test planning meetings
    • Guiding development of cyber test objectives
    • Reviewing test plans to ensure objectives are feasible and executable
    • Participating in test planning site visits

Test Preparation

  • Support preparation activities for cyber OT&E events, including:
    • Participation in site pre-test coordination visits and delivery of test site in-briefs
    • Reviewing approved test plans
    • Adding relevant artifacts and research to the test library
    • Conducting in-depth SUT research and presenting findings to the red team
    • Preparing OPTEVFOR Red Team (OPTEV-RT) test assets

Test Execution

  • Execute assigned cyber test events, including Cooperative Vulnerability Penetration Assessments, Adversarial Assessments, and Cyber Tabletop exercises, in support of Operational Testing, Developmental Testing, risk reduction efforts, and other assigned events
  • Employ OPTEVFOR-provided and NAO-approved commercial and open-source cyber assessment tools, including:
    • Core Impact, Nmap, Burp Suite, Metasploit, Nessus
  • Apply ethical hacking techniques to exploit discovered vulnerabilities and misconfigurations across:
    • Operating systems (Windows, Linux, Unix)
    • Network protocols and services (HTTP, FTP, DNS, PKI, HTTPS)
  • Execute testing activities independently and provide technical guidance and oversight to Basic-level operators
  • Ensure all testing is conducted safely, in accordance with approved test plans and OPTEVFOR policies
  • Adhere to JFHQ-DoDIN deconfliction procedures
  • Verify accuracy and completeness of collected test data
Post-Test and Continuous Improvement

  • Participate in the post-test iterative process, including development of deficiency and risk documentation
  • Document test execution lessons learned and support continuous improvement initiatives
  • Generate and update documentation required to maintain DCAT authorization in accordance with DoDI 8585.01
  • Participate in capture-the-flag events, cyber off-sites, red team huddles, and technical exchange meetings; develop supporting products and materials
  • Attend OPTEVFOR-required meetings in support of OT&E activities


DCWF Knowledge, Skills, Abilities, and Tasks (KSATs)

In addition to meeting all KSAT requirements for a Basic Access Network Operator, the Intermediate operator demonstrates the following:

Skills

  • Assessing existing tools to identify capability gaps and improvement opportunities
  • Testing and evaluating cyber tools for operational implementation
  • Knowledge management and technical documentation (e.g., wiki-based documentation)
  • Processing exfiltrated data for analysis and dissemination
  • Evaluating and validating locally developed tools for operational use


Knowledge

  • Active defense methodologies and system hardening techniques
  • Encryption algorithms and cyber tools (e.g., TLS, PGP)
  • Evasion strategies and exploitation techniques
  • Forensic implications of operating system structures and processes
  • Host-based security products and their impact on exploitation
  • Network administration, construction, and topology
  • Security hardware and software options and their effects on exploitation artifacts
  • Security implications of software configurations
  • Digital forensics fundamentals to extract actionable intelligence
  • Cryptologic capabilities, limitations, and contributions to cyber operations
  • Unix/Linux and Windows operating system internals (process management, directory structures, installed applications)
  • Network collection procedures, including decryption techniques and tools

Salary.com Estimation for Intermediate Red Team Operator in Virginia, VA
$92,001 to $117,074
If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

What is the career path for a Intermediate Red Team Operator?

Sign up to receive alerts about other jobs on the Intermediate Red Team Operator career path by checking the boxes next to the positions that interest you.
Income Estimation: 
$47,734 - $70,079
Income Estimation: 
$117,368 - $161,623
Income Estimation: 
$64,676 - $95,211
Income Estimation: 
$55,294 - $77,815
Income Estimation: 
$99,793 - $130,112
Income Estimation: 
$125,027 - $157,872
View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

Job openings at GCA

  • GCA Virginia, VA
  • Position Overview: This Program Manager will be responsible for overall management, coordination, and execution of contract operations. The individual will... more
  • 4 Days Ago

  • GCA Virginia, VA
  • Position Overview The System Administrator is responsible for installing, configuring, troubleshooting, and maintaining hardware and software systems and a... more
  • 4 Days Ago

  • GCA Virginia, VA
  • This position is designated as an Intermediate-level Network Operations Specialist (DCWF Work Role 441) and is not designated as Key Personnel . The indivi... more
  • 4 Days Ago

  • GCA Virginia, VA
  • The Basic Red Team Operator supports OPTEVFOR Cyber Operational Test & Evaluation (OT&E) activities by conducting penetration testing and red team operatio... more
  • 4 Days Ago


Not the job you're looking for? Here are some other Intermediate Red Team Operator jobs in the Virginia, VA area that may be a better fit.

  • Millennium Corporation Virginia, VA
  • Millennium Corporation is hiring a Red Team Operator in Virginia Beach, VA. Qualified candidates must have a Top-Secret clearance. Execute full-spectrum of... more
  • 5 Days Ago

  • GCA Virginia, VA
  • The Basic Red Team Operator supports OPTEVFOR Cyber Operational Test & Evaluation (OT&E) activities by conducting penetration testing and red team operatio... more
  • 4 Days Ago

AI Assistant is available now!

Feel free to start your new journey!