Red Team Engineer
197134
Desired skills:
offensive, ethical hacking, Dublin, red team, security, penetration testing
Red Team Engineer
Location: Dublin
Employment Type: Full-Time
Salary: €75,000 - €95,000
A long‑established financial organisation is expanding its offensive security capability and adding a Red Team Engineer to support adversarial simulation work across internal networks, applications, identity surfaces, and containerised environments. You'll work closely with engineering teams to validate defensive gaps, refine attack paths, and strengthen internal tooling used for continuous testing. The role mixes hands‑on exploitation, behavioural testing, scripting, and controlled engagement work that feeds directly into the organisation's defensive strategy.
The Role
1. Conduct controlled adversarial exercises targeting on‑prem, cloud-linked, and containerised workloads.
2. Validate and escalate findings from vulnerability and detection tooling, focusing on real exploitability.
3. Perform lateral movement, identity abuse, and post‑exploitation investigations across mixed environments.
4. Develop and maintain internal scripts, payloads, and test modules to support red team operations.
5. Map attack paths and collaborate with defensive teams to improve detection clarity and response workflows.
6. Assist in designing repeatable adversary emulation scenarios aligned with current threat activity.
7. Produce concise technical reporting and support remediation prioritisation with engineering stakeholders.
8. Research new techniques, behaviours, and emerging attack chains relevant to financial services.
Skills & Experience
9. 3+ years in offensive security, red teaming, or advanced penetration testing.
10. Strong understanding of network exploitation, identity abuse, and privilege escalation techniques.
11. Familiarity with offensive tooling ecosystems (C2 frameworks, Impacket suites, BloodHound, redirectors, custom payloads, .
12. Proficiency in Python, Bash, or a similar scripting language.
13. Experience with Windows domain testing and Linux privilege mechanisms.
14. Exposure to container or CI/CD abuse techniques is beneficial.
15. Ability to break down complex attack chains for non‑security engineers.
16. Strong documentation habits and an ability to communicate clearly under operational constraints.
Certs like CRTO, PNPT, OSCP, or similar offensive certifications are helpful but not required.
Reperio Human Capital acts as an Employment Agency and an Employment Business.
Recruiter not found