Company – Our client is a globally recognized cybersecurity leader, serving enterprise and government clients across critical industries. Renowned for its advanced threat detection and red team operations, this organization is at the forefront of offensive security and cyber resilience.
Job Title – Red Team Operator
Location – Remote (must be located in a Western Europe time zone)
Role Type – Contract (6 months, with potential for extension)
Must Have Skills:
* English speaker (required)
* Active certification in at least one of the following: Offensive Security OSCP or GIAC GPEN
* Active certification in at least one of the following: Security+, SSCP, CISSP, CISM, GSEC, GCIH, GSLC, CASP, Network+, CCNA, CCNP, CCIE
* Proficiency in Python, PowerShell, and Bash scripting
* Hands-on experience with both Linux and Windows operating systems
* Deep familiarity with tools such as Kali Linux, Metasploit Pro, and NMAP
* Ability to exploit vulnerabilities such as SQL injection, XSS, and conduct password cracking
* Prior experience on a Cyber Defense Blue Team (e.g., SOC, Incident Response, Threat Hunting, or Security Architecture)
* Strong understanding of the MITRE ATT&CK Framework
* Solid grasp of ports, protocols, operating systems, and file system fundamentals
* Knowledge of computer networking concepts and experience with vulnerability scoring and remediation
Responsibilities and Job Details:
* Conduct comprehensive red team operations simulating real-world attacks
* Identify vulnerabilities through manual and automated techniques
* Leverage advanced toolsets and custom scripts to exploit systems securely
* Collaborate with blue teams to improve detection and response capabilities
* Document and present findings to technical and executive stakeholders
* Utilize MITRE ATT&CK tactics in planning and executing red team campaigns
* Continuously improve testing methodologies and red teaming capabilities
* Maintain awareness of evolving threat landscapes and offensive techniques
* Assist in training internal teams on adversary behaviors and defense strategies
* Support incident response and threat emulation efforts when needed
* Ensure operational security and compliance throughout engagements
* Contribute to after-action reports and remediation plans for clients