Red Team Operator in York

Red Team Operator in York

York Full-Time 60000 - 80000 £ / year (est.) No home office possible
Foregenix

At a Glance

  • Tasks: Lead Red Team campaigns to test and enhance client security defences.
  • Company: Join a cutting-edge cybersecurity firm focused on offensive security.
  • Benefits: Competitive salary, flexible work options, and opportunities for professional growth.
  • Other info: Collaborative environment with a focus on innovation and continuous learning.
  • Why this job: Make a real impact by identifying security gaps and improving client safety.
  • Qualifications: 3+ years in Red Team operations and relevant industry certifications required.

The predicted salary is between 60000 - 80000 £ per year.

Purpose: You will lead efforts to validate the effectiveness of client security defences (people, process, and technology) by executing realistic, goal-oriented Adversary Emulation and full-scope Red Team campaigns. Your mission is to rigorously test security detection and response capabilities, identify true defensive gaps, and provide actionable intelligence based on real-world threat actor Tactics, Techniques, and Procedures (TTPs) to enhance the client's operational security posture.

You will work closely with senior members of the Offensive Security Services and technical teams to design and execute complex, covert offensive security campaigns, including Adversary Emulation, social engineering, and continuous assessment of defensive mechanisms, with a secondary focus on advanced penetration testing.

As an experienced offensive security specialist, you will combine strong hands-on technical expertise with a structured and analytical approach. You will translate technical findings into meaningful business risk, ensuring clients clearly understand both the implications and the path to remediation.

To succeed in this role:

  • You will successfully plan and execute complex, multi-month Red Team and Adversary Emulation campaigns, ensuring strict adherence to stealth requirements and operational security (OPSEC) throughout the engagement lifecycle.
  • You will leverage industry-recognized frameworks (e.g., MITRE ATT&CK) to accurately emulate realistic threat actors, focusing on demonstrating detection and response gaps, defining real-world exploitation paths, and articulating the meaningful business impact, rather than mere vulnerability identification.
  • You will drive continuous improvement by contributing to the development and enhancement of advanced assessment methodologies, proprietary tooling, and offensive frameworks to ensure our consulting services remain industry-leading.
  • You will proactively research emerging threats, vulnerabilities, and exploitation techniques to keep our services relevant and effective, and apply this knowledge to continuously refine client assessment strategies and risk management approaches.
  • You will take ownership of engagements, ensuring timely delivery in accordance with manager instructions.
  • You will collaborate closely with internal teams, including Offensive Security, CRS, and Sales, to deliver integrated cybersecurity services.
  • You will embody the team spirit that defines us: everyone has a voice, and everyone can help shape the future of the company.

In this role, you will:

  • Design, lead, and execute complex, multi-layered Red Team engagements and advanced penetration testing across diverse client environments, including network, infrastructure, cloud (AWS/Azure/GCP), and web application testing, to rigorously evaluate security controls and demonstrate the potential impact on business and operational risk.
  • Develop, deploy, and maintain custom offensive tooling (covert payloads and specialised implants), resilient Command and Control (C2) infrastructure, and sophisticated defensive evasion techniques to bypass modern security controls (e.g., EDR, AV) and maintain persistent, stealthy access.
  • Conduct in-depth research across a wide variety of cybersecurity domains, including new vulnerabilities and exploitation techniques, to inform and enhance both internal service offerings and client assessment strategies.
  • Manage all client communications and expectations throughout the process. Produce comprehensive, high-quality final reports, including detailed technical findings and critical analysis (Post-Action Report - PAR) of the defensive team's performance, ensuring timely finalisation of the engagement.

You are expected to bring:

  • Proven, 3+ years of hands-on experience leading Red Team or Adversary Emulation campaigns.
  • Formal validation through relevant, hands-on industry certifications (e.g., Offensive Security, CREST, SANS, Zero-Point Security, Altered Security).
  • Proven ability to identify and analyse systemic security or resiliency gaps across various client environments.
  • Deep technical understanding of lateral movement, privilege escalation, and persistence techniques within complex enterprise environments.
  • Demonstrable expertise in one or more critical enterprise offensive security domains, such as: Active Directory exploitation, Social Engineering, Cloud exploitation (AWS/Azure/GCP), physical security, web technologies, or DevOps environments.
  • In-depth, practical experience deploying, managing, and utilising multiple Command and Control (C2) frameworks (e.g., Cobalt Strike, Covenant, or custom solutions), with a strict awareness of operational security (OPSEC) and detection evasion.
  • Proficiency in at least one scripting language (e.g., Python, Ruby) and one programming language (e.g., C, C++, C#, Java), enabling custom tooling and automation.
  • Active participation and genuine interest in the offensive security community (e.g., evidenced by contributions to open-source tools, security blogs, or conference participation), coupled with the ability to work autonomously and manage multiple high-stakes engagements effectively.
  • Advanced level of English; working knowledge of French or German is a plus.

Advantageous Competencies:

  • Direct experience operating across multiple regulated client environments (e.g., finance, government, healthcare), including familiarity or direct experience delivering regulatory-driven Red Team testing frameworks (e.g., CBEST, TIBER).
  • Hands-on experience targeting and exploiting complex containerised technologies like Kubernetes and Docker.
  • Demonstrated hands-on expertise in reverse engineering malware and defensive tools (AV/EDR agents) to identify detection methods and develop tailored bypasses.
  • Exceptional communication and structured report writing skills, with the proven ability to influence and engage stakeholders at all organisational levels, including senior and C-level management, and translate technical vulnerabilities into clear business risk.
  • Exposure to or practical experience in applying emerging AI/ML techniques within offensive security, such as prompt injection or other advanced methods.

Please note we only accept docs in PDF format.

Red Team Operator in York employer: Foregenix

As a leading player in the cybersecurity sector, we pride ourselves on fostering a dynamic and inclusive work culture that empowers our employees to excel. Our Red Team Operators benefit from continuous professional development opportunities, access to cutting-edge tools, and the chance to collaborate with industry experts in a supportive environment. Located in a vibrant city, we offer a unique blend of challenging projects and a strong commitment to work-life balance, making us an exceptional employer for those seeking meaningful and rewarding careers in offensive security.
Foregenix

Contact Detail:

Foregenix Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land Red Team Operator in York

✨Tip Number 1

Network like a pro! Attend cybersecurity meetups, conferences, or online forums where you can connect with industry experts. Building relationships can lead to job opportunities that aren't even advertised yet.

✨Tip Number 2

Show off your skills! Create a portfolio showcasing your Red Team projects, tools you've developed, or any contributions to open-source security tools. This gives potential employers a taste of what you can bring to the table.

✨Tip Number 3

Practice makes perfect! Engage in Capture The Flag (CTF) competitions or online labs to sharpen your skills. This not only boosts your confidence but also demonstrates your commitment to continuous learning in offensive security.

✨Tip Number 4

Apply through our website! We love seeing passionate candidates who align with our mission. Tailor your application to highlight your hands-on experience and how you can contribute to our team spirit and innovative approach.

We think you need these skills to ace Red Team Operator in York

Adversary Emulation
Red Team Engagements
Penetration Testing
Command and Control (C2) Frameworks
Active Directory Exploitation
Social Engineering
Cloud Exploitation (AWS/Azure/GCP)
Scripting Languages (e.g., Python, Ruby)
Programming Languages (e.g., C, C++, C#, Java)
Operational Security (OPSEC)
Vulnerability Analysis
Technical Report Writing
Stakeholder Communication
Emerging Threat Research
Defensive Evasion Techniques

Some tips for your application 🫡

Tailor Your CV: Make sure your CV is tailored to the Red Team Operator role. Highlight your hands-on experience with Adversary Emulation and any relevant certifications. We want to see how your skills align with our mission!

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Share your passion for offensive security and how you’ve tackled complex challenges in the past. Let us know why you’re excited about joining StudySmarter and what you can bring to the team.

Showcase Your Technical Skills: Don’t hold back on showcasing your technical expertise! Mention specific tools, frameworks, and languages you’re proficient in. We love seeing candidates who can demonstrate their knowledge of the latest security trends and techniques.

Follow Application Guidelines: Remember to submit your application as a PDF, as we only accept documents in that format. It’s a small detail, but it shows you pay attention to instructions, which is crucial in our line of work!

How to prepare for a job interview at Foregenix

✨Know Your TTPs

Familiarise yourself with the Tactics, Techniques, and Procedures (TTPs) of real-world threat actors. This will not only help you understand the role better but also allow you to discuss how you would apply these in your campaigns during the interview.

✨Showcase Your Technical Skills

Be prepared to demonstrate your hands-on experience with offensive security tools and techniques. Bring examples of past Red Team engagements or penetration tests you've led, and be ready to discuss the methodologies you used and the outcomes achieved.

✨Communicate Clearly

Practice articulating complex technical findings in a way that non-technical stakeholders can understand. This is crucial for translating vulnerabilities into business risks, so think about how you would explain your work to someone at the C-level.

✨Stay Current with Trends

Research the latest trends in cybersecurity, especially emerging threats and vulnerabilities. Being able to discuss recent developments shows your commitment to continuous improvement and your proactive approach to security challenges.

Red Team Operator in York
Foregenix
Location: York

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

>