Social network you want to login/join with:
As a Red Team Operator, you'll simulate real-world cyberattacks to uncover vulnerabilities across the company's infrastructure, including cloud and on-prem environments. You'll plan and lead offensive security assessments, develop custom tools, and work closely with detection teams to improve security defences. This role blends technical expertise, creative thinking, and leadership to stay ahead of evolving cyber threats.
Responsibilities:
* Plan and execute Red Team operations, including adversary emulation and attack simulations.
* Conduct network, application, cloud, and social engineering assessments.
* Build and maintain secure, stealthy C2 infrastructure (AWS, Azure, GCP).
* Develop tools, scripts, and malware for internal use.
* Work with Blue Team on Purple Team exercises to test detection capabilities.
* Research emerging threats and incorporate new tactics and techniques.
* Deliver clear technical reports and briefings to stakeholders.
Requirements:
* 3-5 years in offensive security or penetration testing.
* Experience with tools like Cobalt Strike and EDR evasion techniques.
* Strong understanding of AD exploitation, malware development, and security evasion.
* Preferred: OSCP, SANS, or related certifications.
For more info, contact Seamus at Reperio or apply by sending your CV through the link
Reperio Human Capital acts as an Employment Agency and an Employment Business.
Red Team Operator
159435
Desired skills:
Red Team, Pen Test, Offensive Security
As a Red Team Operator, you'll simulate real-world cyberattacks to uncover vulnerabilities across the company's infrastructure, including cloud and on-prem environments. You'll plan and lead offensive security assessments, develop custom tools, and work closely with detection teams to improve security defences. This role blends technical expertise, creative thinking, and leadership to stay ahead of evolving cyber threats.
Responsibilities:
1. Plan and execute Red Team operations, including adversary emulation and attack simulations.
2. Conduct network, application, cloud, and social engineering assessments.
3. Build and maintain secure, stealthy C2 infrastructure (AWS, Azure, GCP).
4. Develop tools, scripts, and malware for internal use.
5. Work with Blue Team on Purple Team exercises to test detection capabilities.
6. Research emerging threats and incorporate new tactics and techniques.
7. Deliver clear technical reports and briefings to stakeholders.
Requirements:
8. 3-5 years in offensive security or penetration testing.
9. Proficient in languages like C/C++, C#, PowerShell, Rust, etc.
10. Experience with tools like Cobalt Strike and EDR evasion techniques.
11. Strong understanding of AD exploitation, malware development, and security evasion.
12. Solid communication skills
13. Preferred: OSCP, SANS, or related certifications.
For more info, contact Seamus at Reperio or apply by sending your CV through the link
Reperio Human Capital acts as an Employment Agency and an Employment Business.
Seamus O'Rawe is recruiting for this role.Get in touch with Seamus O'Rawe for more information: #J-18808-Ljbffr