At a Glance
- Tasks: Lead red team operations and simulate real-world cyber threats for diverse clients.
- Company: Join JUMPSEC, a forward-thinking cybersecurity firm dedicated to innovative solutions.
- Benefits: Enjoy remote work, 25 days leave, flexible hours, and a supportive culture.
- Why this job: Work on challenging problems with a creative team in a high-autonomy environment.
- Qualifications: Experience in red team engagements and fluency in scripting languages required.
- Other info: Contribute to public research and enjoy a strong focus on diversity and inclusion.
The predicted salary is between 46800 - 78000 £ per year.
Location: UK (Remote-first with occasional in-person meetups)
At JUMPSEC, we believe our clients should not be constrained by what has gone before. We want to help them to find novel and forward-thinking ways of meeting their cyber security needs in the face of a continuously evolving and growing cyber threats.
To do this, we work hard to understand our clients and the challenges they face to create tailored solutions and avoid generic, off-the-shelf products and services.
The Role
We’re looking for an experienced Red Team Operator to join our adversary simulation team, delivering high-impact operations against some of the most complex enterprise environments in the UK and beyond. This isn’t a typical penetration testing role. You’ll be leading tailored campaigns that emulate real-world threat actors — from phishing initial access through to cloud-native post-exploitation and domain-level compromise in hybrid estates.
We focus on intelligence-led engagements, simulating TTPs derived from current threat actors, helping our clients uncover blind spots and prepare for the attacks that actually matter.
We value curiosity, creativity, and diverse experience — some of our team came from medicine, others from blue team, IT, or non-technical backgrounds. If you’re an experienced operator looking to work on challenging problems alongside a strong and supportive team, we’d love to hear from you.
What you will be doing:
- Planning and executing full-spectrum red team operations against large-scale organisations.
- Designing and delivering targeted phishing and social engineering campaigns with behavioural realism.
- Performing advanced Active Directory enumeration and abuse, including trust path abuse, delegation exploitation, and credential material extraction.
- Simulating adversary behaviour based on threat intelligence and frameworks (MITRE ATT&CK, TIBER, etc.).
- Identifying and exploiting weaknesses in cloud environments (Microsoft 365, Azure AD, AWS, GCP, Okta).
- Bypassing modern detection controls (EDR/XDR, MFA etc) with solid operational security.
- Developing custom tooling for payload delivery, evasion, and C2 communications.
- Collaborating with defensive teams during purple team exercises to enhance detection and response.
What we are looking for?
- Demonstrable experience delivering red or purple team engagements in large enterprise or regulated environments.
- Strong understanding of both Windows and cloud infrastructure attack surfaces.
- Fluency in one or more scripting languages (PowerShell, Python, Bash) for tooling and automation.
- Proficient with modern red team infrastructure and frameworks (e.g. Cobalt Strike, Mythic, Sliver, custom C2).
- Solid grasp of Active Directory and Azure AD internals, and related abuse paths.
- Familiarity with common social engineering tactics and phishing techniques, from initial contact to payload execution.
- Ability to think like an attacker, document like a consultant, and communicate like a trusted advisor.
Nice to have:
- Experience crafting custom payloads or tooling for evasion and post-exploitation.
- Knowledge of TTP simulation frameworks.
- Contributions to open-source security tools or published research/blogs.
- Understanding of adversary emulation in regulatory contexts (TIBER-EU, CBEST, GBEST, etc.)
- Certifications like OSCP, OSCE, CRTO, or equivalent hands-on experience (we care more about skill than certs).
- A competitive salary up to £65K depending upon experience
- 25 days annual leave, including your birthday off work
- 4 paid days for charity or community work
- Flexible hybrid working
- 24/7 access to our Employee Assistance Plan (EAP)
- Earn up to £2000 in our recruitment referral scheme
- Company pension
Company Culture:
- Supportive and inclusive company culture that values diversity and encourages new ideas and perspectives
- High-autonomy environment with supportive, skilled peers.
- Annual training & research budget — use it for conferences, courses, or tooling.
- Access to red team labs, testing infrastructure, CTI, and sandbox environments.
- Opportunities to contribute to public research, tools, and community initiatives.
- Flexible work, sensible management, and zero micromanagement.
How to apply
If you are interested in applying for this role, please provide a short cover letter outlining your experience and why you would be a good fit for JUMPSEC to careers@jumpsec.com. Please reference JSRedTeamer25 in the subject line.
For more information on who we are and what we do, please visit www.jumpsec.com.
Whilst we do our utmost to reply to each candidate, we are sometimes inundated with applications, and this can lead to slight delays in replies. If you do not hear back from us within 20 working days, please consider yourself unsuccessful and we thank you for your time and effort in applying for this role.
At JUMPSEC, we believe that great people drive our success, and we embrace diversity and inclusion as integral parts of our company culture. We welcome individuals from all backgrounds, ethnicities, cultures, and genders. Diverse perspectives and ideas contribute to the uniqueness of our brand and enable the creative problem-solving that our clients value. Join us on our mission to create a safer digital world!
Achieve the cyber security outcomes you need.
We work to enable effective cyber security for our clients; helping them to future proof their cyber defences and realise genuine improvement over time.
Jumpsec Limited is a limited company registered in England and Wales under company number: 08327063
Unit 3E – 3F, 33 – 34 Westpoint, Warple Way, Acton W3 0RG
Get in touch with an accredited Incident Response experts who can help you contain, recover and mitigate attacks.
For regular switchboard please
contact – 0333 939 8080
Privacy Preference Center
Manage Consent Preferences
Always Active
#J-18808-Ljbffr
Red Team Consultant (Senior) employer: Jumpsec Limited
Contact Detail:
Jumpsec Limited Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Red Team Consultant (Senior)
✨Tip Number 1
Familiarise yourself with the latest threat intelligence and frameworks like MITRE ATT&CK. Understanding these will not only help you in interviews but also demonstrate your proactive approach to staying updated in the field.
✨Tip Number 2
Engage with the cyber security community by attending relevant conferences or webinars. Networking with professionals in the field can provide insights into current trends and may even lead to referrals for positions like the one at JUMPSEC.
✨Tip Number 3
Showcase your hands-on experience with red team tools and scripting languages through personal projects or contributions to open-source initiatives. This practical experience can set you apart from other candidates.
✨Tip Number 4
Prepare for potential interviews by simulating red team operations in a lab environment. This will not only sharpen your skills but also give you concrete examples to discuss during your interview, demonstrating your capability and readiness for the role.
We think you need these skills to ace Red Team Consultant (Senior)
Some tips for your application 🫡
Tailor Your Cover Letter: Craft a cover letter that specifically addresses the requirements and responsibilities outlined in the job description. Highlight your relevant experience in red team operations and how it aligns with JUMPSEC's mission to provide innovative cyber security solutions.
Showcase Your Skills: In your CV, emphasise your technical skills, particularly in scripting languages and red team frameworks. Provide concrete examples of past engagements where you successfully executed red or purple team operations, detailing the impact of your work.
Demonstrate Your Understanding: Make sure to convey your understanding of the current cyber threat landscape and how your experience can help JUMPSEC's clients. Reference specific methodologies like MITRE ATT&CK or TIBER to show your familiarity with industry standards.
Follow Application Instructions: When submitting your application, ensure you reference 'JSRedTeamer25' in the subject line as instructed. This shows attention to detail and ensures your application is processed correctly.
How to prepare for a job interview at Jumpsec Limited
✨Showcase Your Technical Skills
Be prepared to discuss your experience with red team operations and the specific tools you've used, such as Cobalt Strike or custom C2 frameworks. Highlight any scripting languages you are fluent in, like PowerShell or Python, and be ready to provide examples of how you've applied these skills in real-world scenarios.
✨Demonstrate Your Understanding of Threat Intelligence
Familiarise yourself with the MITRE ATT&CK framework and other relevant threat intelligence sources. During the interview, articulate how you would simulate adversary behaviour based on current threats and how this knowledge can help clients identify vulnerabilities.
✨Emphasise Your Problem-Solving Abilities
JUMPSEC values creativity and curiosity, so be ready to discuss challenging problems you've faced in previous roles and how you approached them. Use specific examples to illustrate your thought process and the innovative solutions you implemented.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions that assess your ability to think like an attacker. Practice articulating your thought process when planning and executing red team operations, including how you would handle unexpected challenges during a simulation.