Red Team Operator, Senior

Red Team Operator, Senior

Full-Time 43200 - 72000 £ / year (est.) No home office possible
B

At a Glance

  • Tasks: Lead Red and Purple team engagements to validate security controls for top-tier clients.
  • Company: Join a cutting-edge security firm working with Fortune 100 companies.
  • Benefits: Enjoy a collaborative environment, continuous learning, and opportunities for innovation.
  • Why this job: Be part of a passionate team tackling real-world security challenges and making an impact.
  • Qualifications: 2+ years in security testing, experience with Linux, and strong programming skills required.
  • Other info: Opportunity to obtain Offensive Security Certification within a year of hire.

The predicted salary is between 43200 - 72000 £ per year.

Social network you want to login/join with:

Red Team Operator, Senior, Cambridgeshire

col-narrow-left

Client:

Location:

Cambridgeshire, United Kingdom

Job Category:

Other

EU work permit required:

Yes

col-narrow-right

Job Reference:

8d9877b82103

Job Views:

8

Posted:

17.06.2025

Expiry Date:

01.08.2025

col-wide

Job Description:

Red Team Operator, Senior

Key Role:

Work with a wide variety of clients, including Fortune 100 companies, to validate security controls and incident response through offensive security operations, including Red and Purple Teaming. Interface directly with client leadership and technical security staff to lead Red and Purple team engagements in a wide variety of scenarios ranging from phishing-based initial access to OT or ICS network perimeter and egress testing. Work with a team of 10+ seasoned security testing professionals to enhance existing service offerings and security testing capabilities and conduct hands-on technical testing focused on detection and response that necessitates continuously customized tooling to avoid AV, EDR, and other protection technologies. Conduct full exploitation and leveraging of access within multiple environments, including complex Active Directory and mixed Windows and nix environment. Develop comprehensive and accurate reports and presentations for both technical and executive audiences. Communicate findings and strategy effectively to client stakeholders, including technical staff, executive leadership, and legal counsel. Apply security testing and penetration testing techniques and mindset to a wide range of projects. Act as the primary interface and lead for small red teams ranging from 1-3 additional testers and manage the delivery of staff assignments, as needed. Become part of a team of security enthusiasts that perform cutting-edge research and promote an environment of innovation and knowledge-sharing.

Basic Qualifications:

  • 2+ years of experience leading security testing teams

  • Experience conducting and leading TIBER-EU Red Teams or DORA Threat Led Penetration Tests

  • Experience using, administering, and troubleshooting Linux and Ubuntu

  • Experience scripting and editing existing code and programming, including Perl, Python, Ruby, Bash, C, C++, C#, or Java

  • Experience developing, extending, or modifying exploits, shellcode, or exploit tools to evade common EDRs

  • Experience with security assessment tools, including Mythic, Burp Suite Pro, Cobalt Strike, Sliver, Havoc, or Covenant

  • Knowledge of network penetration red teaming and purple teaming

  • Knowledge of open security testing standards and projects, including OWASP and ATT&CK

  • Ability to present technical findings to both technical and non-technical audiences

  • Bachelor’s degree

  • Additional Qualifications:

  • 5+ years of experience in offensive security testing such as Web application security testing, network penetration testing, red teaming, or purple teaming

  • Experience with Amazon cloud environments and its major technologies such as IAM, EC2, VPC, EBS, S3, and Lambda

  • Experience working in a Windows environment and assessing Active Directory security issues, including privilege escalation

  • Experience working in a commercial environment

  • Experience with phishing and other social engineering tactics

  • Experience with assembly languages, including x86 or reverse engineering

  • Experience with hardware reverse engineering using JTAG or UART

  • Experience with Terraform or similar automation technologies

  • Experience with physical security assessments, including the use of proxmark3 or similar proximity card spoofing or copying devices

  • Ability to obtain an Offensive Security Certification, including OSWP, OSCP, OSCE, OSWE, SANS, GAWN, GPEN, or GXPN Certification, within one year of hire date

  • Commitment to Non-Discrimination

    All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, local, or international law.

    #J-18808-Ljbffr

    Red Team Operator, Senior employer: Booz Allen Hamilton

    Join a dynamic team in Cambridgeshire where innovation meets expertise in offensive security operations. As a Senior Red Team Operator, you'll collaborate with Fortune 100 clients, enhancing your skills in a supportive work culture that prioritises employee growth and knowledge-sharing. Enjoy competitive benefits and the opportunity to lead cutting-edge projects in a vibrant tech community.
    B

    Contact Detail:

    Booz Allen Hamilton Recruiting Team

    StudySmarter Expert Advice 🤫

    We think this is how you could land Red Team Operator, Senior

    ✨Tip Number 1

    Network with professionals in the cybersecurity field, especially those who have experience in red teaming. Attend industry conferences, webinars, or local meetups to connect with potential colleagues and learn about the latest trends and techniques.

    ✨Tip Number 2

    Showcase your hands-on experience by participating in Capture The Flag (CTF) competitions or contributing to open-source security projects. This not only enhances your skills but also demonstrates your commitment to continuous learning and innovation in offensive security.

    ✨Tip Number 3

    Familiarise yourself with the specific tools mentioned in the job description, such as Mythic, Burp Suite Pro, and Cobalt Strike. Having practical knowledge of these tools can set you apart during interviews and show that you're ready to hit the ground running.

    ✨Tip Number 4

    Prepare to discuss your previous experiences leading security testing teams. Be ready to share specific examples of challenges you've faced, how you overcame them, and the impact your leadership had on the success of the projects.

    We think you need these skills to ace Red Team Operator, Senior

    Offensive Security Techniques
    Red Teaming and Purple Teaming
    Security Testing Leadership
    Linux and Ubuntu Administration
    Scripting and Programming (Perl, Python, Ruby, Bash, C, C++, C#, Java)
    Exploit Development and Modification
    Security Assessment Tools (Mythic, Burp Suite Pro, Cobalt Strike, Sliver, Havoc, Covenant)
    Network Penetration Testing
    Open Security Testing Standards (OWASP, ATT&CK)
    Technical Reporting and Presentation Skills
    Amazon Cloud Technologies (IAM, EC2, VPC, EBS, S3, Lambda)
    Active Directory Security Assessment
    Social Engineering Tactics
    Assembly Language Knowledge (x86, Reverse Engineering)
    Hardware Reverse Engineering (JTAG, UART)
    Automation Technologies (Terraform)
    Physical Security Assessments
    Offensive Security Certifications (OSWP, OSCP, OSCE, OSWE, SANS, GAWN, GPEN, GXPN)

    Some tips for your application 🫡

    Tailor Your CV: Make sure your CV highlights relevant experience in offensive security, particularly in leading Red and Purple team engagements. Use specific examples that demonstrate your skills in scripting, penetration testing, and working with security assessment tools.

    Craft a Strong Cover Letter: Write a cover letter that showcases your passion for security testing and your ability to communicate technical findings effectively. Mention your experience with TIBER-EU Red Teams and any relevant certifications you hold or are pursuing.

    Highlight Technical Skills: In your application, emphasise your proficiency with programming languages and security tools mentioned in the job description. Be specific about your experience with Linux, Active Directory, and cloud environments like AWS.

    Showcase Team Leadership: Since the role involves leading small teams, include examples of your leadership experience in security testing. Discuss how you've managed projects or mentored junior team members to demonstrate your capability in this area.

    How to prepare for a job interview at Booz Allen Hamilton

    ✨Showcase Your Technical Skills

    Be prepared to discuss your experience with security assessment tools and scripting languages. Highlight specific projects where you successfully led a team or conducted penetration tests, especially in complex environments like Active Directory.

    ✨Communicate Clearly

    Since you'll be interfacing with both technical and non-technical stakeholders, practice explaining your findings in a way that's easy to understand. Prepare to present a past project or scenario where you effectively communicated complex information.

    ✨Demonstrate Leadership Experience

    As a Senior Red Team Operator, you'll need to lead small teams. Share examples of how you've managed team dynamics, delegated tasks, and ensured successful project delivery in previous roles.

    ✨Stay Updated on Industry Trends

    Familiarise yourself with the latest trends in offensive security and red teaming. Be ready to discuss recent developments or tools you've explored, showing your commitment to continuous learning and innovation in the field.

    Red Team Operator, Senior
    Booz Allen Hamilton
    B
    Similar positions in other companies
    UK’s top job board for Gen Z
    discover-jobs-cta
    Discover now
    >