2 years leadership experience directly leading a team Minimum 2 years of independently conducting every phase of a red team exercise on their own without guidance or supervision. Minimum 2 years mentoring junior and mid-level operators on red team tradecraft and Advanced Knowledge Requirements (that they possess). Minimum 2 years of hands-on experience in network mapping, vulnerability scanning, and penetration and web application testing using software frameworks (including but not limited to: Cobalt Strike, Kali, burpsuite, etc.) to meet operational requirements. Strong communication skills for interfacing with clients and documenting findings Demonstrated experience working both collaboratively and independently with minimal supervision. Script writing and crafting of payloads that bypass A/V and EDR solutions for use in various phases of a red team exercise. In- depth Experience pen testing on internal and external networks Minimum 5 years of hands-on web application penetration testing experience, with a strong preference for OSCP or equivalent hands-on certifications (e.g. CBBH, CWEE, OSWA, OSWE, GWAPT). Experience developing actionable intelligence based on open source intelligence (OSINT) gathering. Experience building offensive capabilities or tools to enhance operations with programming languages such as, but not limited to, Python, Bash, terraform, ansible, etc. Experience in testing web-based APIs (i.e. REST, SOAP, XML, JSON). Advanced knowledge of manual testing techniques and automated tools (e.g., Burp Suite, OWASP ZAP) to assess application security. Familiarity with FISMA and NIST 800-series frameworks; experienced in applying formal testing protocols and methodologies to assess networks, web apps, and cloud environments. CRTO certification required (or ability to obtain within 90 days of start date) Willing and able to travel as needed. Up to 50% during periods of high workload