At a Glance
- Tasks: Lead Red and Purple team engagements to validate security controls for top-tier clients.
- Company: Join a cutting-edge security firm working with Fortune 100 companies.
- Benefits: Enjoy a collaborative environment, continuous learning, and opportunities for innovation.
- Why this job: Be part of a passionate team tackling real-world security challenges and making an impact.
- Qualifications: 2+ years in security testing, experience with Linux, and strong programming skills required.
- Other info: Opportunity to obtain Offensive Security Certification within a year of hire.
The predicted salary is between 43200 - 72000 £ per year.
Social network you want to login/join with:
Red Team Operator, Senior, Cambridgeshire
col-narrow-left
Client:
Location:
Cambridgeshire, United Kingdom
Job Category:
Other
–
EU work permit required:
Yes
col-narrow-right
Job Reference:
8d9877b82103
Job Views:
8
Posted:
17.06.2025
Expiry Date:
01.08.2025
col-wide
Job Description:
Red Team Operator, Senior
Key Role:
Work with a wide variety of clients, including Fortune 100 companies, to validate security controls and incident response through offensive security operations, including Red and Purple Teaming. Interface directly with client leadership and technical security staff to lead Red and Purple team engagements in a wide variety of scenarios ranging from phishing-based initial access to OT or ICS network perimeter and egress testing. Work with a team of 10+ seasoned security testing professionals to enhance existing service offerings and security testing capabilities and conduct hands-on technical testing focused on detection and response that necessitates continuously customized tooling to avoid AV, EDR, and other protection technologies. Conduct full exploitation and leveraging of access within multiple environments, including complex Active Directory and mixed Windows and nix environment. Develop comprehensive and accurate reports and presentations for both technical and executive audiences. Communicate findings and strategy effectively to client stakeholders, including technical staff, executive leadership, and legal counsel. Apply security testing and penetration testing techniques and mindset to a wide range of projects. Act as the primary interface and lead for small red teams ranging from 1-3 additional testers and manage the delivery of staff assignments, as needed. Become part of a team of security enthusiasts that perform cutting-edge research and promote an environment of innovation and knowledge-sharing.
Basic Qualifications:
2+ years of experience leading security testing teams
Experience conducting and leading TIBER-EU Red Teams or DORA Threat Led Penetration Tests
Experience using, administering, and troubleshooting Linux and Ubuntu
Experience scripting and editing existing code and programming, including Perl, Python, Ruby, Bash, C, C++, C#, or Java
Experience developing, extending, or modifying exploits, shellcode, or exploit tools to evade common EDRs
Experience with security assessment tools, including Mythic, Burp Suite Pro, Cobalt Strike, Sliver, Havoc, or Covenant
Knowledge of network penetration red teaming and purple teaming
Knowledge of open security testing standards and projects, including OWASP and ATT&CK
Ability to present technical findings to both technical and non-technical audiences
Bachelor’s degree
Additional Qualifications:
5+ years of experience in offensive security testing such as Web application security testing, network penetration testing, red teaming, or purple teaming
Experience with Amazon cloud environments and its major technologies such as IAM, EC2, VPC, EBS, S3, and Lambda
Experience working in a Windows environment and assessing Active Directory security issues, including privilege escalation
Experience working in a commercial environment
Experience with phishing and other social engineering tactics
Experience with assembly languages, including x86 or reverse engineering
Experience with hardware reverse engineering using JTAG or UART
Experience with Terraform or similar automation technologies
Experience with physical security assessments, including the use of proxmark3 or similar proximity card spoofing or copying devices
Ability to obtain an Offensive Security Certification, including OSWP, OSCP, OSCE, OSWE, SANS, GAWN, GPEN, or GXPN Certification, within one year of hire date
Commitment to Non-Discrimination
All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, local, or international law.
#J-18808-Ljbffr
Red Team Operator, Senior employer: Booz Allen Hamilton
Contact Detail:
Booz Allen Hamilton Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Red Team Operator, Senior
✨Tip Number 1
Network with professionals in the cybersecurity field, especially those who have experience in red teaming. Attend industry conferences, webinars, or local meetups to connect with potential colleagues and learn about the latest trends and techniques.
✨Tip Number 2
Showcase your hands-on experience by participating in Capture The Flag (CTF) competitions or contributing to open-source security projects. This not only enhances your skills but also demonstrates your commitment to continuous learning and innovation in offensive security.
✨Tip Number 3
Familiarise yourself with the specific tools mentioned in the job description, such as Mythic, Burp Suite Pro, and Cobalt Strike. Having practical knowledge of these tools can set you apart during interviews and show that you're ready to hit the ground running.
✨Tip Number 4
Prepare to discuss your previous experiences leading security testing teams. Be ready to share specific examples of challenges you've faced, how you overcame them, and the impact your leadership had on the success of the projects.
We think you need these skills to ace Red Team Operator, Senior
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in offensive security, particularly in leading Red and Purple team engagements. Use specific examples that demonstrate your skills in scripting, penetration testing, and working with security assessment tools.
Craft a Strong Cover Letter: Write a cover letter that showcases your passion for security testing and your ability to communicate technical findings effectively. Mention your experience with TIBER-EU Red Teams and any relevant certifications you hold or are pursuing.
Highlight Technical Skills: In your application, emphasise your proficiency with programming languages and security tools mentioned in the job description. Be specific about your experience with Linux, Active Directory, and cloud environments like AWS.
Showcase Team Leadership: Since the role involves leading small teams, include examples of your leadership experience in security testing. Discuss how you've managed projects or mentored junior team members to demonstrate your capability in this area.
How to prepare for a job interview at Booz Allen Hamilton
✨Showcase Your Technical Skills
Be prepared to discuss your experience with security assessment tools and scripting languages. Highlight specific projects where you successfully led a team or conducted penetration tests, especially in complex environments like Active Directory.
✨Communicate Clearly
Since you'll be interfacing with both technical and non-technical stakeholders, practice explaining your findings in a way that's easy to understand. Prepare to present a past project or scenario where you effectively communicated complex information.
✨Demonstrate Leadership Experience
As a Senior Red Team Operator, you'll need to lead small teams. Share examples of how you've managed team dynamics, delegated tasks, and ensured successful project delivery in previous roles.
✨Stay Updated on Industry Trends
Familiarise yourself with the latest trends in offensive security and red teaming. Be ready to discuss recent developments or tools you've explored, showing your commitment to continuous learning and innovation in the field.