At a Glance
- Tasks: Lead and execute advanced red team operations across global financial assets.
- Company: Join a top-tier global financial institution focused on real-world adversary simulation.
- Benefits: Enjoy remote work flexibility, innovative projects, and a high-impact environment.
- Why this job: Be part of a mature team that values creativity and operational excellence in cybersecurity.
- Qualifications: 3-4+ years in red teaming with expertise in areas like evasions or custom malware.
- Other info: Work with cutting-edge tools and frameworks in a mission-critical role.
The predicted salary is between 54000 - 84000 £ per year.
A global financial institution is hiring a Senior Red Team Engineer to join its internal offensive security team. This is a rare opportunity to work in a mature, highly capable global red team that focuses exclusively on real-world adversary simulation — not generic pen testing.
You’ll be responsible for leading and executing sophisticated red team operations across the bank’s global footprint. The team operates with full scope: endpoint, network, application, cloud, physical, and human-based vectors. You should bring a deep understanding of attacker tradecraft, be comfortable building your own tooling when needed, and have the mindset of someone who enjoys thinking like an adversary — not just scanning for vulnerabilities.
We’re looking for someone with real depth in at least one area of red teaming (e.g., evasive payload development, infrastructure, Windows internals, social engineering, etc.). This is a hands-on technical role, suited to someone who has already spent several years in dedicated offensive roles and wants to operate in a high-trust, high-impact environment.
What you’ll be doing:
- Designing and delivering full kill-chain red team operations targeting enterprise assets and staff
- Emulating real-world APT behaviour, including custom tooling, C2 infrastructure, lateral movement, and exfiltration
- Working closely with detection and response teams to test visibility and improve resilience
- Leading campaign design, execution, and reporting, with a focus on realism and impact
- Creating or modifying tools, exploits, and payloads as needed — not relying solely on off-the-shelf frameworks
- Supporting threat-led testing programs and integrating threat intelligence into operations
- Maintaining strict operational security and professional discipline in all activities
What we’re looking for:
- 3–4+ years of true red teaming experience (not general pen testing)
- A deep skillset in one or more areas: evasions, custom malware, cloud red teaming, physical access, phishing infrastructure, or post-exploitation
- Strong scripting or development background (e.g., Python, Go, C#, or C)
- Experience with major red team frameworks (e.g., Sliver, Mythic, Cobalt Strike) and a willingness to go beyond them
- Familiarity with adversary emulation frameworks and MITRE ATT&CK
- Exposure to social engineering or physical red teaming is a strong bonus
- A calm, pragmatic communicator who can write clearly and explain technical risk to a non-technical audience
- High level of personal ownership, operational maturity, and discretion
This is an opportunity to work in one of the most well-resourced offensive security programs in financial services, with global scope, freedom to innovate, and a mission-critical mandate.
Senior Red Team Operator employer: Iceberg
Contact Detail:
Iceberg Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Senior Red Team Operator
✨Tip Number 1
Network with professionals in the cybersecurity field, especially those involved in red teaming. Attend industry conferences, webinars, or local meetups to connect with potential colleagues and learn about the latest trends and tools in offensive security.
✨Tip Number 2
Showcase your hands-on experience by participating in Capture The Flag (CTF) competitions or contributing to open-source red team projects. This not only hones your skills but also demonstrates your commitment and expertise to potential employers.
✨Tip Number 3
Familiarise yourself with the specific tools and frameworks mentioned in the job description, such as Sliver, Mythic, and Cobalt Strike. Having practical knowledge of these tools will give you an edge during interviews and discussions.
✨Tip Number 4
Prepare to discuss real-world scenarios where you've successfully executed red team operations. Be ready to explain your thought process, the challenges you faced, and how you overcame them, as this will highlight your problem-solving skills and technical depth.
We think you need these skills to ace Senior Red Team Operator
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your specific experience in red teaming, focusing on the areas mentioned in the job description such as evasive payload development and social engineering. Use keywords from the job listing to ensure your application stands out.
Craft a Compelling Cover Letter: In your cover letter, explain why you are passionate about offensive security and how your skills align with the role. Mention specific projects or experiences that demonstrate your ability to think like an adversary and lead red team operations.
Showcase Technical Skills: Include a section in your application that showcases your technical skills, particularly in scripting languages like Python or Go, and your familiarity with red team frameworks. This will help illustrate your hands-on experience and technical depth.
Prepare for Technical Questions: Anticipate technical questions related to red teaming during the interview process. Be ready to discuss your previous experiences, the tools you've developed, and how you've approached real-world adversary simulations.
How to prepare for a job interview at Iceberg
✨Showcase Your Technical Depth
Make sure to highlight your specific expertise in red teaming during the interview. Discuss your experience with evasive payload development, custom tooling, or any other area where you excel. This will demonstrate your capability and fit for the role.
✨Prepare Real-World Scenarios
Be ready to discuss real-world adversary simulations you've conducted. Prepare examples that showcase your ability to think like an attacker and how you approached complex challenges. This will help illustrate your hands-on experience and strategic thinking.
✨Communicate Clearly
As a Senior Red Team Operator, you'll need to explain technical risks to non-technical stakeholders. Practice articulating your thoughts clearly and concisely, ensuring you can convey complex ideas in an understandable way.
✨Demonstrate Operational Security Mindset
Emphasise your commitment to operational security and professional discipline. Share examples of how you've maintained strict security protocols in past roles, as this is crucial for the position and will show your maturity in handling sensitive information.