Job Openings Mid-Level Red Team/Pen Tester

About the job Mid-Level Red Team/Pen Tester

Must be a US Citizen living in the US and pass a Public Trust Clearance to qualify

Now Hiring: Red Team Operator (Mid-Level)
Location: Remote
Clearance: Must be eligible for Public Trust or Suitability/Fitness Determination

Overview:
Our client is seeking a skilled and motivated Red Team Operator with 3-7 years of experience in penetration testing and adversary emulation. This is a hands-on technical role for someone who can think like an attacker, build evasive tools, and contribute to mission-driven Red Team engagements. You'll collaborate with an elite cybersecurity team conducting exercises that simulate real-world threats against complex environments.

If you have a background in offensive security, a desire to innovate, and the skills to fly under the radar, read on.

What You'll Do:

  • Execute and support advanced Red Team operations across enterprise and cloud-based environments

  • Develop and deploy custom malware and evasive tooling using frameworks like Mythic or Cobalt Strike

  • Emulate threat actor TTPs and perform stealthy operations from initial access to post-exploitation

  • Collaborate with Purple Teams and internal defenders to improve detection and response

  • Write detailed operational reports that document findings, techniques used, and recommendations for mitigation

  • Support the development of internal Red Team playbooks, tools, and infrastructure

  • Mentor junior team members and contribute to a strong offensive security culture

What You Bring:

  • 37 years of hands-on experience in Red Team, Penetration Testing, or Offensive Tool Development

  • Experience working on Red or Purple Team engagements

  • Solid background in malware development and creating evasive tooling

  • Familiarity with at least one major Command and Control (C2) framework, such as Mythic or Cobalt Strike

  • Strong scripting/programming skills (Python, C++, or C# preferred)

  • Experience evading modern detection tools and endpoint security platforms

Nice to Have:

  • Certifications such as OSCP, CRTO, OSCE, GPEN, GXPN, GCIH, CISSP, CEH, OSWE, or GWAPT

  • Malware engineering or reverse engineering experience

  • Ability to work independently and drive operations from planning through execution

  • Clear, confident communication skills for both technical and non-technical audiences

Why Join This Team?

This role gives you the chance to operate in a mission-critical environment where creativity, stealth, and skill are celebrated. You'll be part of a tight-knit, highly capable team with a shared goal: helping clients improve their cyber resilience by thinking like the adversary.

Equal Employment Opportunity Statement:
We are an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability, or veteran status.