At a Glance
- Tasks: Lead Red Team campaigns to test and enhance client security defences.
- Company: Join a cutting-edge cybersecurity firm with a collaborative spirit.
- Benefits: Competitive salary, flexible work options, and opportunities for professional growth.
- Other info: Dynamic role with opportunities to innovate and shape the future of cybersecurity.
- Why this job: Make a real impact by identifying security gaps and improving client safety.
- Qualifications: 3+ years in Red Team operations and relevant industry certifications required.
The predicted salary is between 60000 - 80000 £ per year.
Purpose: You will lead efforts to validate the effectiveness of client security defences (people, process, and technology) by executing realistic, goal-oriented Adversary Emulation and full-scope Red Team campaigns. Your mission is to rigorously test security detection and response capabilities, identify true defensive gaps, and provide actionable intelligence based on real-world threat actor Tactics, Techniques, and Procedures (TTPs) to enhance the client's operational security posture.
You will work closely with senior members of the Offensive Security Services and technical teams to design and execute complex, covert offensive security campaigns, including Adversary Emulation, social engineering, and continuous assessment of defensive mechanisms, with a secondary focus on advanced penetration testing. As an experienced offensive security specialist, you will combine strong hands-on technical expertise with a structured and analytical approach. You will translate technical findings into meaningful business risk, ensuring clients clearly understand both the implications and the path to remediation.
To succeed in this role:
- You will successfully plan and execute complex, multi-month Red Team and Adversary Emulation campaigns, ensuring strict adherence to stealth requirements and operational security (OPSEC) throughout the engagement lifecycle.
- You will leverage industry-recognized frameworks (e.g., MITRE ATT&CK) to accurately emulate realistic threat actors, focusing on demonstrating detection and response gaps, defining real-world exploitation paths, and articulating the meaningful business impact, rather than mere vulnerability identification.
- You will drive continuous improvement by contributing to the development and enhancement of advanced assessment methodologies, proprietary tooling, and offensive frameworks to ensure our consulting services remain industry-leading.
- You will proactively research emerging threats, vulnerabilities, and exploitation techniques to keep our services relevant and effective, and apply this knowledge to continuously refine client assessment strategies and risk management approaches.
- You will take ownership of engagements, ensuring timely delivery in accordance with manager instructions.
- You will collaborate closely with internal teams, including Offensive Security, CRS, and Sales, to deliver integrated cybersecurity services.
- You will embody the team spirit that defines us: everyone has a voice, and everyone can help shape the future of the company.
In this role, you will:
- Design, lead, and execute complex, multi-layered Red Team engagements and advanced penetration testing across diverse client environments, including network, infrastructure, cloud (AWS/Azure/GCP), and web application testing, to rigorously evaluate security controls and demonstrate the potential impact on business and operational risk.
- Develop, deploy, and maintain custom offensive tooling (covert payloads and specialised implants), resilient Command and Control (C2) infrastructure, and sophisticated defensive evasion techniques to bypass modern security controls (e.g., EDR, AV) and maintain persistent, stealthy access.
- Conduct in-depth research across a wide variety of cybersecurity domains, including new vulnerabilities and exploitation techniques, to inform and enhance both internal service offerings and client assessment strategies.
- Manage all client communications and expectations throughout the process. Produce comprehensive, high-quality final reports, including detailed technical findings and critical analysis (Post-Action Report - PAR) of the defensive team's performance, ensuring timely finalisation of the engagement.
You are expected to bring:
- Proven, 3+ years of hands-on experience leading Red Team or Adversary Emulation campaigns.
- Formal validation through relevant, hands-on industry certifications (e.g., Offensive Security, CREST, SANS, Zero-Point Security, Altered Security).
- Proven ability to identify and analyse systemic security or resiliency gaps across various client environments.
- Deep technical understanding of lateral movement, privilege escalation, and persistence techniques within complex enterprise environments.
- Demonstrable expertise in one or more critical enterprise offensive security domains, such as: Active Directory exploitation, Social Engineering, Cloud exploitation (AWS/Azure/GCP), physical security, web technologies, or DevOps environments.
- In-depth, practical experience deploying, managing, and utilising multiple Command and Control (C2) frameworks (e.g., Cobalt Strike, Covenant, or custom solutions), with a strict awareness of operational security (OPSEC) and detection evasion.
- Proficiency in at least one scripting language (e.g., Python, Ruby) and one programming language (e.g., C, C++, C#, Java), enabling custom tooling and automation.
- Active participation and genuine interest in the offensive security community (e.g., evidenced by contributions to open-source tools, security blogs, or conference participation), coupled with the ability to work autonomously and manage multiple high-stakes engagements effectively.
- Advanced level of English; working knowledge of French or German is a plus.
Advantageous Competencies:
- Direct experience operating across multiple regulated client environments (e.g., finance, government, healthcare), including familiarity or direct experience delivering regulatory-driven Red Team testing frameworks (e.g., CBEST, TIBER).
- Hands-on experience targeting and exploiting complex containerised technologies like Kubernetes and Docker.
- Demonstrated hands-on expertise in reverse engineering malware and defensive tools (AV/EDR agents) to identify detection methods and develop tailored bypasses.
- Exceptional communication and structured report writing skills, with the proven ability to influence and engage stakeholders at all organisational levels, including senior and C-level management, and translate technical vulnerabilities into clear business risk.
- Exposure to or practical experience in applying emerging AI/ML techniques within offensive security, such as prompt injection or other advanced methods.
Please note we only accept docs in PDF format.
Red Team Operator employer: Foregenix
Contact Detail:
Foregenix Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Red Team Operator
✨Tip Number 1
Network like a pro! Attend cybersecurity meetups, conferences, or online forums where you can connect with industry experts. Building relationships can lead to job opportunities that aren't even advertised yet.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your Red Team projects, tools you've developed, or any contributions to open-source security tools. This gives potential employers a taste of what you can bring to the table.
✨Tip Number 3
Practice makes perfect! Engage in Capture The Flag (CTF) competitions or online labs to sharpen your skills. Not only will this boost your confidence, but it also demonstrates your commitment to continuous learning.
✨Tip Number 4
Apply through our website! We love seeing candidates who are genuinely interested in joining us. Tailor your application to highlight how your experience aligns with our mission and values, and don’t forget to follow up!
We think you need these skills to ace Red Team Operator
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Red Team Operator role. Highlight your hands-on experience with Adversary Emulation and any relevant certifications. We want to see how your skills align with our mission!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Share your passion for offensive security and how you’ve tackled complex challenges in the past. Let us know why you’re excited about joining StudySmarter and what you can bring to the team.
Showcase Your Technical Skills: Don’t hold back on showcasing your technical expertise! Mention specific tools, frameworks, and languages you’re proficient in. We love seeing candidates who can demonstrate their knowledge of the latest security trends and techniques.
Follow Application Guidelines: Remember to submit your application as a PDF, as we only accept documents in that format. It’s a small detail, but it shows you pay attention to instructions, which is crucial in our line of work!
How to prepare for a job interview at Foregenix
✨Know Your TTPs
Familiarise yourself with the Tactics, Techniques, and Procedures (TTPs) of real-world threat actors. This knowledge will not only help you understand the role better but also allow you to discuss how you would apply these in your campaigns during the interview.
✨Showcase Your Technical Skills
Be prepared to demonstrate your hands-on experience with offensive security tools and techniques. Bring examples of past Red Team engagements or penetration tests you've led, and be ready to discuss the methodologies you used and the outcomes achieved.
✨Communicate Clearly
Practice articulating complex technical findings in a way that non-technical stakeholders can understand. This is crucial for translating vulnerabilities into business risks, so think about how you would explain your work to someone at the C-level.
✨Engage with the Community
Highlight your involvement in the offensive security community, whether through open-source contributions, blogs, or conferences. This shows your passion for the field and your commitment to staying updated on emerging threats and techniques.