Cookies & analytics consent
We serve candidates globally, so we only activate Google Tag Manager and other analytics after you opt in. This keeps us aligned with GDPR/UK DPA, ePrivacy, LGPD, and similar rules. Essential features still run without analytics cookies.
Read how we use data in our Privacy Policy and Terms of Service.
🤖 15+ AI Agents working for you. Find jobs, score and update resumes, cover letter, interview questions, missing keywords, and lots more.

Tek-staffing • Maryland, United States
Role & seniority: Cyber Red Team Operator (Penetration Testing, Senior Associate); full-time on-site.
Stack/tools: Metasploit, Burp Suite, Cobalt Strike, NMAP, Core Impact; Windows and Linux OS, IP networks; familiarity with network devices, switches/routers.
Conduct adversarial threat emulation (Red Teaming) and penetration testing for platform IT and government networks (Windows/Linux, network devices).
Identify vulnerabilities and weaknesses in operational networks and programs; apply advanced principles, concepts, and tactics.
Collaborate with government customer on assessments and deliver findings, supporting test/evaluation for DoD programs.
10+ years in pen testing, red team operations, or offensive security; on-net assessment experience.
Proficiency with open-source/commercial tools (e.g., Metasploit, Burp Suite, Cobalt Strike, NMAP, Core Impact).
Working knowledge of IP networking (subnetting, routing, switching); penetration testing of Windows/Linux; cyber range or real-world assessment experience.
Industry certifications: EC-Council C|EH and ISC2 CISSP (or equivalents); ability to obtain OSCE/OSCP/GXPN within 6 months.
Bachelor’s degree or equivalent experience; TS clearance with SCI eligibility.
Cyber-related military training (JCAC, Title 10 on-net, etc.); OSCP highly desirable.
Web app penetration, RF/SDR, weapon-system assessments, scripting (Bash/Pyth
Cyber Red Team Operator (Penetration Testing, Senior Associate) FTE JOB
Location: Patuxent River, Maryland site. Onsite We do pay RELOCATION
Summary Cyber Red Team Operator (Penetration Testing, Senior Associate) to perform on-net adversarial threat emulation (Red Teaming) and penetration testing of platform IT and networks for Event Planning. This facility supports the mission to provide realistic cybersecurity environments for test and evaluation of major DoD acquisition programs and to enable the conduct of realistic training and certification events for the DoD Cyber Mission Force. The NCRC facility may also support non-DoD customers such as Department of Homeland Security (DHS), industry, academia, and international partners. The successful candidate will serve on-site at the Patuxent River, Maryland site. This position currently requires an on-site schedule with 5 days on-site and is eligible for Compressed Work Schedule (CWS). Position may require flexible weekend and/or evening shift work, as needed. Schedule is subject to change based on company/contract requirements. Responsibilities Working closely with our government customer, perform adversarial threat emulation (Red Teaming) and penetration testing to assess the performance of aeronautical systems, subsystems, and equipment (platform IT). Working closely with our government customer, perform adversarial threat emulation (Red Teaming) and penetration testing assessments on government networks including Windows domains, Linux systems, switches, routers, and other connected network devices. Apply and/or develop highly advanced principles, concepts, and tactics. Identify issues and vulnerabilities associated with operational networks and programs. Travel Up to 10% of the time to CONUS sites as required. Required Qualifications At least 10 years of pen testing, red team operations, and/or offensive security experience including experience conducting on-net assessments Experience operating open source and commercial tools such as Metasploit, Burp Suite, Cobalt Strike, NMAP, Core Impact, etc. Working knowledge of IP network protocols, subnetting, routing, switching, etc.