X8 · 1 day ago
Cyber Operator � Tool Test, Integration, and Evaluation
X8 is seeking a highly capable Cyber Operator focused on operational test, evaluation, and integration of offensive cyber capabilities. This role supports the full lifecycle of cyber tools, ensuring that capabilities deployed into operational environments are reliable, secure, and mission-ready.
Information Technology
Responsibilities
Conduct static and dynamic software testing on offensive cyber tools to assess performance, reliability, and operational impact
Evaluate cyber capabilities through operational tests and evaluation, documenting effects on host systems, networks, and mission environments
Perform tool validation and backlog testing, ensuring tools meet operational and security requirements before deployment
Build and maintain virtual machines and virtual networks to support testing, evaluation, and training environments
Develop and configure template systems for operators to replicate, train, and execute within mission systems
Set up and manage operator training scenarios and Job Qualification Sheets (JQS) to support Title 10 and mission operator certification
Capture, analyze, and document network traffic generated by tools, including running traffic through intrusion detection and defensive systems
Perform forensic analysis to identify tool-generated artifacts, unknown files, and system modifications
Support tool integration by packaging, installing, and validating software within operational systems
Serve as a technical interface between developers and operators, providing feedback on usability, effectiveness, and mission alignment
Participate in TTP evaluation, operational planning support, and cyber capability lifecycle refinement
Ensure compliance with USCYBERCOM Operational Assessment (OA) processes and requirements
Track tool testing and development workflows using platforms such as JIRA
Qualification
Required
7+ years of experience as a DoD or IC Cyber Operator (Red Team, CNO, CNE, or OCO)
Graduate of RIOT, Forge, or Basic Operator Course (BOC), OR experience as a DoD Tool Champion or in TTP evaluation and operational planning
Experience conducting network traffic analysis and working with intrusion detection systems
Strong experience with Linux systems, including: System logs and log generation, Linux security products and detection mechanisms, Identifying, analyzing, and documenting security-relevant artifacts
Working knowledge of Windows environments, including: Windows Defender and antivirus products, Windows Firewall, Registry, and Event Logs, Forensic artifact collection and analysis
Demonstrated ability to configure and support secure system access (e.g., SSH)
Hands-on experience with penetration testing suites and cyber exploitation frameworks (e.g., Kali Linux, Metasploit)
Understanding of access control lists, local and domain accounts, and system permission models
Demonstrated programming or scripting ability in languages such as: Python, Bash/Shell, PowerShell, C/C++/C#/Perl/Java (or similar)
Ability to review code and configurations for security, performance, and operational suitability
Strong documentation skills with the ability to track, report, and communicate findings clearly to technical and operational stakeholders
Active TS/SCI CI Poly is required
Preferred
Certification from Offensive Security (OSCP, OSCE, OSWE, OSEE)
Experience supporting Title 10 cyber operations or cyber forces modernization efforts
Benefits
Bonus potential
401K Match - 10%
Paid time off - 24 PTO Days, 13 Holidays
Medical Benefits - 100% Employee, 80% Dependent, $1000 company paid HSA Contribution