Skip to content
mimi

Red Team Operator-4 years with Security Clearance

Kyrus Tech

Washington · Hybrid Full-time Senior $145k – $150k/yr 1mo ago

About the role

About the Role

We are seeking a Red Team Operator - Senior Level to join our growing team. This role resides in our Delivery team and reports to the Program Manager who owns the account. This position is REMOTE with a 1 day a week onsite in Washington DC. (fully remote approved on a case by case basis) SIXGEN supports cyber and intelligence missions by serving government and commercial organizations as they overcome global cybersecurity challenges. Our highly skilled operators conduct research and assessments based on real-world threats. We simulate adversaries and malicious actors to report details and actionable findings on critical assets and infrastructures. Our program planners advise mission owners to bring rapid solutions to intelligence mission leaders. Using innovative processes, tools, and techniques, we predict and overcome cybersecurity vulnerabilities. Our successes are supported by our diverse team of experienced, technical talent. SIXGEN is growing our support to the mission by adding to our team. SIXGEN, Inc. is an Equal Opportunity/Veterans/Disabled Employer.

Responsibilities

  • Conduct research and assessments based on real‑world threats.
  • Simulate adversaries and malicious actors to report details and actionable findings on critical assets and infrastructures.
  • Advise mission owners to bring rapid solutions to intelligence mission leaders.
  • Use innovative processes, tools, and techniques to predict and overcome cybersecurity vulnerabilities.
  • Mentor junior and mid‑level operators on red team tradecraft.
  • Professionally deliver technical red team reports and briefings.

Required Skills and Experience

  • Must be a US Citizen or eligible to obtain a clearance.
  • Minimum 6 years direct, hands‑on technical red team and/or government computer network exploitation/attack operations experience (which is to say direct red team operations work and not just that which is in support of red team operations).
  • Minimum 2 years technical red team and/or government computer network exploitation/attack operations leadership experience (note this is distinct experience from the above and cannot overlap).
  • Minimum 3 years of hands‑on experience with using, modifying and customizing penetration testing and red teaming software frameworks (Cobalt Strike, Kali, etc.) to meet operational requirements.
  • Minimum 2 years of independently conducting every phase of a red team exercise on their own without guidance or supervision.
  • Minimum 2 years of hands‑on experience developing payloads that bypass A/V and EDR solutions for use in various phases of a red team exercise.
  • Minimum 2 years mentoring junior and mid‑level operators on red team tradecraft and Advanced Knowledge Requirements (that they possess).
  • Minimum 2 years of experience in professionally delivering technical red team reports and briefings.

Certifications

  • CRTO certification required (or ability to obtain within 90 days of start date).
  • OSCP, OSCE, OSEE, GXPN, and/or GPEN are preferred, but not required.

Additional Details

  • Job Location: Washington D.C. one day a week / WFH
  • Clearance Requirement: US Citizen, eligible to obtain a clearance
  • Travel: Up to 10%

Compensation & Benefits

  • Competitive salary
  • Employer‑paid health insurance premiums (medical, dental, vision)
  • Employer‑paid short/long term disability insurance and basic life/AD&D insurance
  • 401K with a 4% employer contribution
  • Professional development reimbursement options available (training, certification, education, etc.)
  • Flexible and remote work policies for most positions
  • Paid Time Off (PTO) at a rate of three (3) weeks plus one (1) day per year of service up to four (4) weeks annually
  • 11 paid holidays per calendar year

Compensation

The anticipated salary range for this role is $145,000‑$150,000 per year, depending on experience and qualifications. This range reflects our compensation philosophy, which takes into account various factors including the candidate's relevant experience, education, skills, LCATs rates and position level, and market competitiveness. In addition to base salary, employees may be eligible for other forms of compensation to include our growth incentive program, incentives and benefits. The final salary offer will be determined after a thorough review of the candidate's background and alignment with the role. Please note that this range is subject to change and should be considered as a guideline rather than a definitive figure.

Equal Opportunity Statement

SIXGEN is an Equal Opportunity Employer. We ensure that all applicants are considered for employment without regard to race, color, religion, sexual orientation, gender identity, national origin, disability, age, marital status, ancestry, projected veteran status, or any other protected group or

Requirements

  • Minimum 6 years direct, hands-on technical red team and/or government computer network exploitation/attack operations experience.
  • Minimum 2 years technical red team and/or government computer network exploitation/attack operations leadership experience.
  • Minimum 3 years of hands-on experience with using modifying and customizing penetration testing and red teaming software frameworks (Cobalt Strike, Kali, etc.) to meet operational requirements.
  • Minimum 2 years of independently conducting every phase of a red team exercise on their own without guidance or supervision.
  • Minimum of 2 years of hands-on experience developing payloads that bypass A/V and EDR solutions for use in various phases of a red team exercise.
  • Minimum 2 years mentoring junior and mid-level operators on red team tradecraft and Advanced Knowledge Requirements.
  • Minimum of 2 years of experience in professionally delivering technical red team reports and briefings.
  • CRTO certification required (or ability to obtain within 90 days of start date)
  • Experience performing engagements on cloud, multi- and single-tenant environments.

Responsibilities

  • Simulate adversaries and malicious actors to report details and actionable findings on critical assets and infrastructures.
  • Advise mission owners to bring rapid solutions to intelligence mission leaders.
  • Predict and overcome cybersecurity vulnerabilities using innovative processes, tools, and techniques.

Benefits

health insurancedental insurancevision insuranceshort term disability insurancelong term disability insurancebasic life insuranceAD&D insurance401K with a 4% employer contributionProfessional development reimbursementPaid Time Off (PTO)paid holidays

Skills

Cobalt StrikeEDRKaliAV

Don't send a generic resume

Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.

Get started free