empty

Red Team Senior Network Security Analyst

Cohere

Job Description

Posted on: 
February 24, 2025

Summary and company overview

Summary

Cohere Technology has an exciting opportunity for a Red Team Senior Network Security Analyst supporting the Defense Threat Reduction Agency’s (DTRA) Advance Red Cyber program in executing Red Team Assessments. Red Teams perform assessments from an adversarial viewpoint and use the full spectrum of identified adversarial capabilities, limited only by restrictions mandated by the customer and legal, safety, and security constraints, to test and evaluate protection strategies and demonstrate exploitation of identified vulnerabilities.

Responsibilities

Responsibilities and Duties

  • Supporting the continuous monitoring and risk mitigation of sensitive networks and systems in accordance with DoD cybersecurity policies, procedures, and best practices.
  • Experience with configuring, scanning, monitoring, alerting and reporting security tools.
  • Other duties as assigned.

Job Requirements

Required Qualifications

  • 3+years of experience supporting the continuous monitoring and risk mitigation of sensitive networks and systems.
  • Certification such as CISSP, CSA, Sec+, CySA+, GCWN, GCED or CEH
  • Experience with PCAP collection.
  • Experience as a SOC analyst.

Preferred Qualifications

  • CLEARANCE: Top Secret (TS), TS/SCI preferred.

Additional commentary

Work Environment/Physical Demands

  • Typical office environment, extensive domestic and international travel, and extreme weather conditions. Sitting, walking, talking, hearing, reading, writing, keyboarding, driving, filing, reaching, stooping, crouching, bending, standing for extended periods of time, lifting or carrying up to 40 pounds.

Summary and company overview

Summary

Cohere Technology has an exciting opportunity for a Red Team Senior Network Security Analyst supporting the Defense Threat Reduction Agency’s (DTRA) Advance Red Cyber program in executing Red Team Assessments. Red Teams perform assessments from an adversarial viewpoint and use the full spectrum of identified adversarial capabilities, limited only by restrictions mandated by the customer and legal, safety, and security constraints, to test and evaluate protection strategies and demonstrate exploitation of identified vulnerabilities.

Apply now