×
Register Here to Apply for Jobs or Post Jobs. X

Red Team Operator III

Job in Burlington, Chittenden County, Vermont, 05405, USA
Listing for: NuHarbor Security
Full Time position
Listed on 2026-01-10
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant
Salary/Wage Range or Industry Benchmark: 124000 - 152000 USD Yearly USD 124000.00 152000.00 YEAR
Job Description & How to Apply Below

The Company

Every day, NuHarbor Security improves the cybersecurity of our clients by making it stronger and easier to understand. Our comprehensive suite of security services, from strategic advising to 24‑hour monitoring and management, provides an organizational view of security that is focused on results and recommendations that are valuable for both business and technical leaders. We're growing quickly because our clients, and the general market, are looking for these outcomes and for the data it gives them to explain, promote, and justify their security investment and mission.

The Role

The Red Team Operator III will execute advanced offensive security engagements simulating real‑world cyber‑attacks to identify risks and vulnerabilities across enterprise, cloud, and hybrid environments. This role focuses on planning and performing adversary emulation and red team operations using established tools, techniques, and procedures (TTPs). The operator will document findings with clear business impact and provide actionable recommendations to improve client security posture.

What

you’ll do
  • Live the NuHarbor Ways:
    Help Clients Win, Always Improve, Protect the House.
  • Execute Offensive Engagements:
    Plan and perform complex red team and adversary emulation exercises aligned to real‑world threat actor TTPs (e.g., MITRE ATT&CK), including initial access, privilege escalation, lateral movement, persistence, and data exfiltration.
  • Develop Threat‑Informed Attack Paths:
    Use threat intelligence to design realistic attack scenarios across enterprise, cloud, and hybrid environments.
  • Apply Offensive Techniques:
    Utilize industry‑standard tools and frameworks (e.g., "Cobalt Strike", "Mythic", "CALDERA") to conduct engagements with strict adherence to OPSEC and Rules of Engagement.
  • Document and Communicate Findings:
    Produce clear, comprehensive technical reports and executive summaries that outline vulnerabilities, business impact, and remediation guidance.
  • Collaborate with Defensive Teams:
    Work with blue teams to validate detection coverage and provide feedback on improving detection and response capabilities.
  • Continuous Learning:
    Stay current with emerging attack vectors, vulnerabilities, and red team methodologies to evolve tradecraft and engagement quality.
Your foundation. The requirements for this role:
  • Bachelor's Degree and eight (8+) years of experience in offensive cybersecurity (red teaming, penetration testing, or threat emulation).
    • In lieu of a degree: four (4) years of experience in a related technology field and relevant industry certifications (OSCP, OSWE, GPEN, GXPN, CRTO, etc.).
  • Adversary Emulation Tools:
    Hands‑on experience with frameworks such as "Cobalt Strike", "Mythic", "CALDERA", or equivalent.
  • Operating Systems & Identity:
    Strong understanding of attack surfaces across Windows, Linux, macOS, Active Directory, and Azure AD.
  • Cloud Environments:
    Experience performing offensive testing in AWS, Azure, or GCP environments.
  • Scripting & Automation:
    Ability to script in Python, Power Shell, or Bash for automation and tradecraft development.
  • Networking & Security Fundamentals:
    Solid knowledge of TCP/IP, network protocols, and common security concepts.
  • Reporting:
    Ability to produce clear technical documentation and executive summaries.
  • Citizenship:
    Must be a U.S. citizen.
Additional capabilities that will differentiate you for this role:
  • Certifications:

    OSWE, OSCP, CISSP, GPEN, GXPN; plus GRTP, OSEP, OSCE, CRTO, CRTE or equivalent experience.
  • Familiarity with C2 infrastructure design and operational security practices.
  • Understanding of secure coding principles and modern infrastructure design.
  • Knowledge of incident response processes and defensive detection engineering principles.
  • Experience executing attack paths in AWS, Azure, GCP and hybrid environments; understanding cloud security controls and misconfigurations.
  • Strong written and verbal communication skills.

Base Salary for this role is targeted at $124,000 - $152,000 annually. Offer is based on candidate geography and eligible for a company bonus plan at a 10% target.

NuHarbor Security hires in the following states: AZ, CO, FL, GA, , IL, IN, IA, MA, MD, ME, MI, MN,…

To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary