About the job Mid-Level Red Team/Pen Tester
Must be a US Citizen living in the US and pass a Public Trust Clearance to qualify
Now Hiring: Red Team Operator (Mid-Level)
Location: Remote
Clearance: Must be eligible for Public Trust or Suitability/Fitness Determination
Overview:
Our client is seeking a skilled and motivated Red Team Operator with 3-7 years of experience in penetration testing and adversary emulation. This is a hands-on technical role for someone who can think like an attacker, build evasive tools, and contribute to mission-driven Red Team engagements. You'll collaborate with an elite cybersecurity team conducting exercises that simulate real-world threats against complex environments.
If you have a background in offensive security, a desire to innovate, and the skills to fly under the radar, read on.
What You'll Do:
-
Execute and support advanced Red Team operations across enterprise and cloud-based environments
-
Develop and deploy custom malware and evasive tooling using frameworks like Mythic or Cobalt Strike
-
Emulate threat actor TTPs and perform stealthy operations from initial access to post-exploitation
-
Collaborate with Purple Teams and internal defenders to improve detection and response
-
Write detailed operational reports that document findings, techniques used, and recommendations for mitigation
-
Support the development of internal Red Team playbooks, tools, and infrastructure
-
Mentor junior team members and contribute to a strong offensive security culture
What You Bring:
-
37 years of hands-on experience in Red Team, Penetration Testing, or Offensive Tool Development
-
Experience working on Red or Purple Team engagements
-
Solid background in malware development and creating evasive tooling
-
Familiarity with at least one major Command and Control (C2) framework, such as Mythic or Cobalt Strike
-
Strong scripting/programming skills (Python, C++, or C# preferred)
-
Experience evading modern detection tools and endpoint security platforms
Nice to Have:
-
Certifications such as OSCP, CRTO, OSCE, GPEN, GXPN, GCIH, CISSP, CEH, OSWE, or GWAPT
-
Malware engineering or reverse engineering experience
-
Ability to work independently and drive operations from planning through execution
-
Clear, confident communication skills for both technical and non-technical audiences
Why Join This Team?
This role gives you the chance to operate in a mission-critical environment where creativity, stealth, and skill are celebrated. You'll be part of a tight-knit, highly capable team with a shared goal: helping clients improve their cyber resilience by thinking like the adversary.
Equal Employment Opportunity Statement:
We are an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability, or veteran status.