Red Team Operator III
Listed on 2026-01-10
-
IT/Tech
Cybersecurity, IT Consultant
The Company
Every day, NuHarbor Security improves the cybersecurity of our clients by making it stronger and easier to understand. Our comprehensive suite of security services, from strategic advising to 24‑hour monitoring and management, provides an organizational view of security that is focused on results and recommendations that are valuable for both business and technical leaders. We're growing quickly because our clients, and the general market, are looking for these outcomes and for the data it gives them to explain, promote, and justify their security investment and mission.
The RoleThe Red Team Operator III will execute advanced offensive security engagements simulating real‑world cyber‑attacks to identify risks and vulnerabilities across enterprise, cloud, and hybrid environments. This role focuses on planning and performing adversary emulation and red team operations using established tools, techniques, and procedures (TTPs). The operator will document findings with clear business impact and provide actionable recommendations to improve client security posture.
Whatyou’ll do
- Live the NuHarbor Ways:
Help Clients Win, Always Improve, Protect the House. - Execute Offensive Engagements:
Plan and perform complex red team and adversary emulation exercises aligned to real‑world threat actor TTPs (e.g., MITRE ATT&CK), including initial access, privilege escalation, lateral movement, persistence, and data exfiltration. - Develop Threat‑Informed Attack Paths:
Use threat intelligence to design realistic attack scenarios across enterprise, cloud, and hybrid environments. - Apply Offensive Techniques:
Utilize industry‑standard tools and frameworks (e.g., "Cobalt Strike", "Mythic", "CALDERA") to conduct engagements with strict adherence to OPSEC and Rules of Engagement. - Document and Communicate Findings:
Produce clear, comprehensive technical reports and executive summaries that outline vulnerabilities, business impact, and remediation guidance. - Collaborate with Defensive Teams:
Work with blue teams to validate detection coverage and provide feedback on improving detection and response capabilities. - Continuous Learning:
Stay current with emerging attack vectors, vulnerabilities, and red team methodologies to evolve tradecraft and engagement quality.
- Bachelor's Degree and eight (8+) years of experience in offensive cybersecurity (red teaming, penetration testing, or threat emulation).
- In lieu of a degree: four (4) years of experience in a related technology field and relevant industry certifications (OSCP, OSWE, GPEN, GXPN, CRTO, etc.).
- Adversary Emulation Tools:
Hands‑on experience with frameworks such as "Cobalt Strike", "Mythic", "CALDERA", or equivalent. - Operating Systems & Identity:
Strong understanding of attack surfaces across Windows, Linux, macOS, Active Directory, and Azure AD. - Cloud Environments:
Experience performing offensive testing in AWS, Azure, or GCP environments. - Scripting & Automation:
Ability to script in Python, Power Shell, or Bash for automation and tradecraft development. - Networking & Security Fundamentals:
Solid knowledge of TCP/IP, network protocols, and common security concepts. - Reporting:
Ability to produce clear technical documentation and executive summaries. - Citizenship:
Must be a U.S. citizen.
- Certifications:
OSWE, OSCP, CISSP, GPEN, GXPN; plus GRTP, OSEP, OSCE, CRTO, CRTE or equivalent experience. - Familiarity with C2 infrastructure design and operational security practices.
- Understanding of secure coding principles and modern infrastructure design.
- Knowledge of incident response processes and defensive detection engineering principles.
- Experience executing attack paths in AWS, Azure, GCP and hybrid environments; understanding cloud security controls and misconfigurations.
- Strong written and verbal communication skills.
Base Salary for this role is targeted at $124,000 - $152,000 annually. Offer is based on candidate geography and eligible for a company bonus plan at a 10% target.
NuHarbor Security hires in the following states: AZ, CO, FL, GA, , IL, IN, IA, MA, MD, ME, MI, MN,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).