Principal - Red Team Operator
Principal Red Team OperatorThe Principal Red Team Operator is a senior technical role who conducts advanced adversary-simulation exercises to uncover hidden security gaps. In this role, you'll design and execute operations that mimic sophisticated attackers, perform penetration tests, and build test plans driven by real threat intelligence. You'll collaborate with stakeholders across the organization, provide expert guidance on remediation, and deliver clear, actionable reporting. As a senior member of the team, you'll also help shape testing strategy, mentor junior operators, and elevate the maturity of the program.Apply fast, check the full description by scrolling below to find out the full requirements for this role.You Will Be Responsible For:Solicit input from stakeholders to identify testing needs and establish clear, well-defined objectives and scope for testingPlan and execute Red Team operations and Purple Team exercises that mimic the Tactics, Techniques, and Procedures (TTPs) used by threat actors.Write reports based on exercise and testing output.Provide consulting services to stakeholders on remediation and mitigation strategies.Research industry trends and news sources for emerging threat patterns, attack techniques, and vulnerabilities.Write and customize testing tools and scripts to automate testing functions.Incorporate social engineering (e.g. phishing, vishing, and physical tailgating) into campaigns to exploit human vulnerabilities.Perform penetration tests on applications, networks, or other types of systems.Build threat models for various types of systems.Helping management develop the future vision for the testing program.Build positive relationships with peers and operations teams whose controls are under evaluation.Perform after hours testing in accordance with business requirementsOther duties as assigned.The Experience You Bring:Minimum 6 years of relevant experience in information security with 4 years in red team testingPrior experience with offensive tools, network penetration testing tools, scripting languages, command and control frameworks, programming languages (C, C++, C#), software vulnerabilities, exploits and malware development.Prior experience leveraging threat intelligence for operations planning such as TIBER or Advance Red Team testing frameworks.Proficient operational understanding of how to ascertain, validate, and employ data from sources that are generally available to the public.Fluent in the techniques that hackers utilize to attack an organization and understand how to pull information from large data sets and how to structure information for reusePossess a solid understanding of enterprise-grade technologies including operating systems, databases, web applications & applicable monitoring toolsStrong Network infrastructure & Security configuration knowledge.Prior experience of vulnerability management and application security. xevrcycFamiliarity with MITRE ATT&CK framework.OSCP or CRTO in good standing