At a Glance
- Tasks: Lead and manage Red Team operations to uncover security vulnerabilities.
- Company: Join Bugcrowd, a leader in crowdsourced security solutions.
- Benefits: Enjoy remote work, competitive salary, and a supportive team culture.
- Why this job: Make a real impact in cybersecurity while working with elite hackers.
- Qualifications: Experience in Red Team operations and strong technical skills required.
- Other info: Be part of a diverse team that values creativity and innovation.
The predicted salary is between 43200 - 72000 £ per year.
We are Bugcrowd. Since 2012, we have been empowering organizations to take back control and stay ahead of threat actors by uniting the collective ingenuity and expertise of our customers and trusted alliance of elite hackers, with our patented data and AI-powered Security Knowledge Platform. Our network of hackers brings diverse expertise to uncover hidden weaknesses, adapting swiftly to evolving threats, even against zero-day exploits. With unmatched scalability and adaptability, our data and AI-driven CrowdMatch technology in our platform finds the perfect talent for your unique fight. We aim to create a new era of modern crowdsourced security that outpaces threat actors.
Job Summary
To lead, oversee, and quality assure the execution of Red Team engagements end-to-end from scoping & planning, through execution, reporting, to debrief and capability development. Ensure that all operations are safe, legal, technically robust, aligned with threat intelligence, compliance frameworks, and deliver high value to customers. Also act as a subject-matter expert and manager for both operations and sales / client-facing aspects of Red Team services.
Essential Duties and Responsibilities
- Engagement & Project Management
- Lead multiple concurrent Red Team engagements across industries.
- Define, negotiate and document scope, objectives, rules of engagement, deliverables, constraints, escalation & approval pathways.
- Oversee milestone planning e.g. kick-offs, stand-ups, wash-ups, strategic debriefs.
- Manage resources e.g. operator assignments, tooling, support functions.
- Track engagement progress vs objectives, adjust as needed (scope creep, technical roadblocks, changing risk posture).
- Technical Leadership & Oversight
- Assess and manage technical risk ensuring that any red team activity minimises risk to customer operations, data, systems.
- Real-time decision making during operations around TTP deployment, bypass of defenses, managing detections or unexpected discovery.
- Review and approve attack plans, threat modelling, intelligence.
- Ensure operators employ strong operational security (OpSec), safe tradecraft, evidence collection, clean up post-engagement.
- Maintain up-to-date knowledge of Red Team tools, adversary TTPs, defensive controls, detection systems.
- Legal, Compliance & Ethical Oversight
- Ensure engagements comply with relevant legislation (Computer Misuse / cybercrime laws, data protection / privacy laws, cross-border implications).
- Ensure proper RoE, Authorisation, NDAs etc are in place.
- Ethical boundaries are defined and respected (non-disruptive vs destructive operations, safety, privacy).
- Ensure client teams (Blue, White, Leadership) are appropriately engaged / informed while preserving operational effectiveness.
- Ensure verifiable trail of evidence, documentation of decisions.
- Threat Intelligence & Scenario Design
- Ingest threat intelligence (both internal and external) to design realistic adversary scenarios.
- Analyse likely threat actors relevant to the client's sector, geography, technology stack.
- Ensure mapping of TTPs to enterprise defensive controls so that bypass or detection assumptions are realistic.
- Define high-level & detailed attack scenarios, get buy-in from stakeholders.
- Quality Assurance, Reporting & Debrief
- Review deliverables for technical quality, completeness, clarity.
- Approve final reports, attack paths and recommendations.
- Ensure reports are actionable, mapped to risks, business impact, prioritisation and are defensible.
- Lead strategic debriefs with clients showing what worked, what was detected and what needs improvement.
- Post engagement "wash-up" with lessons learned, replay / walkthrough and remediation tracking.
- Research, Development & Knowledge Sharing
- Mentor Red Team operators in skills, tradecraft and OpSec.
- Drive internal research, new tools, detection evasion, environment emulation in cloud, OT etc.
- Keep up with CREST (and other) certification standards / best practices.
- Build / maintain knowledge base of TTPs, failed vs successful techniques and case studies.
- Input into training, playbooks, standard operating procedures (SOPs).
- Maintain and evolve capability libraries (TTPs, tooling, tradecraft, detection evasion). Dedicated time will be provided for this.
- Sales / Pre-sales & Customer Engagement
- Assist in scoping and proposal of Red Team engagements for prospects.
- Provide subject-matter expert support during sales cycles.
- Help clients understand trade-offs (cost, risk, duration, impact).
- Help articulate the value of Red Team exercises vs other security activities (pen testing, bug bounty etc.).
- Governance & Stakeholder Management
- Part of "White Team" / engagement control group so monitoring risk, ensuring escalation and maintaining safety boundaries.
- Liaise with clients' internal stakeholders, Security, Legal, Compliance, Business Risk, IT / DevOps / Ops / Cloud teams.
- Escalate issues when engagements encounter risk, detection, or adverse business impact.
- Manage communications & approval flows using Attack Approval Chains and Comms Channels.
- Ensure engagements satisfy frameworks/regulatory/compliance requirements applicable to client e.g. FedRAMP, STAR / CREST STAR, STAR-equivalent, DORA, TIBER, CBEST, AASE, etc. if applicable.
Education, Experience, Skills, & Abilities
- Extensive experience leading and/or managing Red Team engagements in enterprise environments, preferably across multiple industries (e.g. finance, critical infrastructure, cloud / SaaS / OT).
- Deep technical knowledge of exploitation, post-exploitation, lateral movement, persistence, command & control, evasion, privilege escalation.
- Good knowledge and experience with Blue Team controls e.g. IDS/IPS, SIEM, EDR, NGFW, log analysis, detection engineering, ideally experience in bypassing or evading them safely.
- Solid experience with modern cloud environments (Azure, AWS, GCP), hybrid / on-premise networks, potentially OT/IoT/industrial environments.
- Strong tradecraft / OpSec awareness around how to avoid detection and conduct operations with minimal operational risk.
- Familiarity with CREST / STAR / TIBER etc. and regulatory / compliance requirements in relevant geographies.
- Proven experience in threat intelligence ingestion, scenario design, mapping to relevant threat actors.
- Excellent written and verbal communication skills and able to produce high quality reports, executive summaries, interact with senior leadership, legal, compliance etc.
- Good project / operations management skills with an eye for budgeting, scheduling, resource allocation, interfacing external/internal teams.
- Ability to make real-time decisions under pressure, to balance risk vs reward.
- Certifications (nice-to-have): CREST Certified Simulated Attack Manager / Red Team Manager (CCSAM / CCRTM), CREST Certified Red Team Specialist (CCRTS), etc. Plus, perhaps technical offensive certs.
Working Conditions
The ideal candidate must be able to complete all physical requirements of the job with or without reasonable accommodation. Sitting and/or standing - Must be able to remain in a stationary position 50% of the time. Carrying and /or lifting - Must be able to carry / move laptop as needed throughout the work day. Environment - remote, work-from-home 100% of the time.
ADA Statement
Bugcrowd is committed to the full inclusion of all qualified individuals. In keeping with our commitment, Bugcrowd will take the steps to assure that people with disabilities are provided reasonable accommodations. Accordingly, if reasonable accommodation is required to fully participate in the job application or interview process, to perform the essential functions of the position, and/or to receive all other benefits and privileges of employment, please contact HR at ada@bugcrowd.com.
Culture
At Bugcrowd, we understand that diversity in the workplace is vital to a company's success and growth. We strive to make sure that people are included and have a sense of being part of making Bugcrowd not only a great product but a great place to work. We regularly hear from both customers and researchers that Bugcrowd feels like a family, and we strive to maintain that internally as well. Our team consists of a broad range of people: musicians, adventure sports junkies, nature lovers, parents, cereal enthusiasts, night owls, cyclists, artists—you get the point. At Bugcrowd, we are solving security threats and vulnerabilities that are relevant to everyone, therefore we believe solving these problems takes all kinds of backgrounds. We value the perspectives and experiences people from underrepresented backgrounds bring.
Disclaimer
This position has access to highly confidential, sensitive information relating to the technologies of Bugcrowd. It is essential that the applicant possess the requisite integrity to maintain the information in the strictest confidence. The company is authorized to obtain background checks for employment purposes under state and federal law. Background checks will be conducted for positions that involve access to confidential or proprietary information (including trade secrets). Background checks may include Social Security verification, prior employment verification, personal and professional references, educational verification, and criminal history. Applicants with conviction histories will not be excluded from consideration to the extent required by law.
Equal Employment Opportunity
Bugcrowd is EOE, Disability/Age Employer. Individuals seeking employment at Bugcrowd are considered without regards to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, gender identity, or sexual orientation.
Red Team Operations Manager in London employer: Bugcrowd
Contact Detail:
Bugcrowd Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Red Team Operations Manager in London
✨Tip Number 1
Network like a pro! Connect with folks in the cybersecurity space, especially those who are already part of Bugcrowd. Attend meetups, webinars, or even online forums to get your name out there and learn from others.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your Red Team engagements, tools you've used, and any successful projects. This will give potential employers a clear view of what you can bring to the table.
✨Tip Number 3
Prepare for interviews by brushing up on your technical knowledge and soft skills. Be ready to discuss real-world scenarios and how you’ve tackled challenges in past engagements. Practice makes perfect!
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re genuinely interested in joining the Bugcrowd family.
We think you need these skills to ace Red Team Operations Manager in London
Some tips for your application 🫡
Tailor Your Application: Make sure to customise your CV and cover letter for the Red Team Operations Manager role. Highlight your relevant experience and skills that align with the job description, especially in leading Red Team engagements and managing technical risks.
Showcase Your Technical Expertise: Don’t hold back on showcasing your deep technical knowledge of exploitation, lateral movement, and command & control. Use specific examples from your past experiences to demonstrate how you’ve successfully navigated complex security challenges.
Be Clear and Concise: When writing your application, clarity is key! Make sure your points are easy to understand and get straight to the point. We want to see your qualifications without sifting through unnecessary fluff.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way to ensure your application gets into the right hands and shows us you’re serious about joining the Bugcrowd team!
How to prepare for a job interview at Bugcrowd
✨Know Your Red Team Stuff
Make sure you brush up on your knowledge of Red Team operations, tools, and techniques. Familiarise yourself with the latest trends in threat intelligence and adversary TTPs. Being able to discuss these topics confidently will show that you're not just a candidate, but a potential leader in the field.
✨Prepare for Scenario-Based Questions
Expect to face scenario-based questions that assess your decision-making skills under pressure. Think about past experiences where you had to manage risk or make real-time decisions during engagements. Be ready to articulate your thought process and how you would handle various situations.
✨Showcase Your Project Management Skills
Since this role involves leading multiple concurrent engagements, highlight your project management experience. Discuss how you've successfully managed resources, tracked progress, and ensured deliverables are met. Use specific examples to demonstrate your ability to juggle multiple tasks effectively.
✨Engage with the Interviewers
Don't just wait for questions; engage with your interviewers. Ask insightful questions about their current Red Team projects or challenges they face. This shows your genuine interest in the role and helps you gauge if Bugcrowd is the right fit for you too.