
Red Team Operator at Maveris. Maveris is an IT and Cybersecurity services company committed to helping organizations create secure digital solutions to accelerate their mission. Originally founded as a Veteran-owned company, we remain deeply committed to supporting veterans and proudly serving customers across the Federal Government and private sector. We have an opening for a full-time, . Red Team Operator. to join our talented, dynamic team.. The . Red Team Operator. will operate as part of our Red Team staff, a key contributor on our small teams conducting advanced adversary emulation operations against real-world targets, in varying environments, and against active network defenders. The . Red Team Operator. will participate in the design, development, and execution of Red Team Operations. The . Red Team Operator. will provide support to the Red Team Leads as required to ensure post operations technical reports and support activities are completed with the required timeline.. Veterans are encouraged to apply.. Duties . . Be a key contributor to Red Team operations and provided expertise to aid in development and execution of Red Team Operations. . . Requires broad technical knowledge and a subject matter expert in relation to adversarial threats and offensive TTP's. . . Chain vulnerabilities together and move laterally through an environment without detection. . . Ability to perform root cause analysis of vulnerabilities and effectively communicate findings to customers in both written and verbal formats. . . Improve team trade-craft, techniques, tactics, procedures, infrastructure, and tooling. . . Conduct independent vulnerability research to discover new vulnerabilities or TTP's. . . Develop scenarios and artifacts that mimic real-world adversary groups for simulated testing. . . Provide remediation recommendations based on discovered weaknesses and vulnerabilities. . . Develop technical reports and work with customers to aid in remediation/validation of discovered findings. . . Support the offensive capabilities team to enhance capabilities, innovate new capabilities, and/or develop training material. . . Work in a collaborative environment with others. . . . Bachelor’s Degree or higher in Computer Science, Information Technology, Cybersecurity, or a related field – equivalent experience may be considered in lieu of a degree.. . 5+ years of Cyber Security experience. . . 3 years of offensive focused experience (Red Teaming, Purple Teaming, Penetration Testing, tool development, etc.). . . Hands-on keyboard experience during multiple Red Team engagements. . . Understand Red Teaming Methodology (Recon, Exploitation, Persistence, Lateral Movement, Post Exploitation, and Exfiltration). . . Be able to explain the tools and techniques used during each phase of a red team operation, their purposes, and any OPSEC-related considerations. . . Experience with common Penetration Testing and Red Team Tools such as Burp Suite, C2 Frameworks, Kali Linux, and Open-Source Hacking Tools. . . Demonstrated ability to script effectively in both Linux and Windows environments, with development experience in a language of choice (e.g., Python, Rust, Go, .NET, etc.). . . Experience with or an understanding of multiple concepts below:. . . Command and Control channel frameworks and Offensive infrastructure deployment. . . Cloud Technologies (Azure, AWS, Heroku). . . Reverse Engineering malware, data obfuscation, or encryption. . . Web Application Technologies. . . Social Engineering and related Psychology disciplines and experience. . . Active Directory and authentication-type technologies (Okta, SAML, ADFS Federation, etc.).. . OPSEC-focused Infrastructure Implementation (Docker, Redirectors, Mail Servers).. . Exploit Development in Windows and Linux environments. . . Rapid Development of offensive-focused tooling and trade-craft. . . Wireless and Radio Frequency technologies (Bluetooth, 802.11, etc.). . . . Hole Offensive Security related certifications.. . Company Location: United States.