Responsibilities

  • Execute full-scope Red Team engagements, including phishing, social engineering, and network penetration testing.
  • Simulate advanced adversary tactics, techniques, and procedures (TTPs) to uncover security weaknesses.
  • Perform internal and external Red Team assessments at client sites.
  • Work closely with Blue Teams in Purple Team exercises to enhance detection and response capabilities.
  • Develop, extend, or modify exploits, shellcode, and tools to simulate sophisticated attacks.
  • Conduct assume breach scenarios to test lateral movement and privilege escalation.
  • Write clear, detailed reports outlining vulnerabilities, exploitation methods, and remediation strategies.
  • Stay updated on the latest threats, attack techniques, and security technologies.

Requirements

  • Proven experience in internal and external Red Team operations.
  • Strong expertise in Active Directory attacks and defenses.
  • Solid experience in EDR evasion techniques and assume breach methodologies.
  • In-depth knowledge of Azure cloud security assessments and attack simulation.
  • Hands-on experience in attacking WiFi, LAN, and other network infrastructures.
  • Proficiency with tools such as Metasploit, Cobalt Strike, BloodHound, and similar offensive security frameworks.
  • Strong scripting skills (Python, PowerShell, Bash) and manual exploitation techniques.
  • Familiarity with frameworks like MITRE ATT&CK.
  • Relevant certifications such as OSCP, OSEP, CRTO, or equivalent are highly valued.