×
Register Here to Apply for Jobs or Post Jobs. X

Red Team Operator - Hybrid

Job in Culpeper, Culpeper County, Virginia, 22701, USA
Listing for: Swift
Full Time position
Listed on 2026-02-15
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below

About Us

We’re the world’s leading provider of secure financial messaging services, headquartered in Belgium. We are the way the world moves value – across borders, through cities and overseas. No other organisation can address the scale, precision, pace and trust that this demands, and we’re proud to support the global economy.

We are seeking an experienced Red Team member to serve on advanced adversary emulation campaigns across our enterprise environments and conduct penetration tests independently. This role combines deep hands‑on technical execution for Red Team operations, tooling, infrastructure, and operator development. You will design and direct large‑scale adversary simulations, coordinate multi‑operator campaigns, and ensure Red Team tradecraft remains ahead of evolving organisational defenses.

You will be responsible not only for executing complex offensive operations, but also for shaping Red Team capability, mentoring operators, and translating offensive outcomes into measurable defensive improvement.

What to Expect
In this role you will
Red Team Operations & Campaign Leadership
  • Architect and execute end‑to‑end adversary simulations across enterprise, cloud, and hybrid infrastructures
  • Lead and coordinate multi‑operator exploitation teams, managing simultaneous kill chains and campaign logistics
  • Direct complex Red Team engagements from reconnaissance and initial access through persistence, lateral movement, and data exfiltration
  • Design and execute network, application, wireless, physical, and cloud penetration tests
  • Build, operate, and maintain Red Team infrastructure, including command‑and‑control (C2) ecosystems, phishing platforms and operational security (OPSEC) tooling
  • Develop and operationalize custom tooling, payloads, automation and exploitation chains
  • Research and implement advanced evasion techniques against SIEM, EDR, and XDR platforms
  • Ensure operational realism, safety, and compliance with internal policy, legal constraints, and regulatory requirements
  • Align Red Team operations with the MITRE ATT&CK framework and threat‑led testing standards (e.g., TIBER)
Leadership, Collaboration & Strategic Enablement
  • Lead Purple Team exercises and translate offensive findings into prioritized defensive improvements
  • Partner with SOC, Blue Team, Threat Intelligence, Risk Management, and Engineering teams to strengthen detection and response maturity
  • Mentor and develop junior and mid‑level operators, sharing techniques, lessons learned, and tooling improvements
  • Interpret technical exploitation in the context of business risk and control effectiveness
  • Communicate technical risk clearly to security leadership and key stakeholders
  • Produce high‑quality After Action Reports (AARs), executive summaries, and technical documentation
What Success Looks Like In This Role
  • Leads complex Red Team engagements independently and as part of a broader campaign strategy
  • Deliver realistic adversary simulations that measurably improve detection and response maturity
  • Build and maintain resilient, covert Red Team infrastructure and tooling ecosystems
  • Develop novel exploitation techniques that stress modern defensive controls
  • Produce clear, actionable reports aligned to business risk and regulatory expectations
  • Strengthen Red Team capability through mentorship, process maturity, and tradecraft standardization
  • Acts as a trusted deputy and technical authority for the Senior Manager
What will make you successful
We are seeking professionals with
  • Bachelors Degree in Computer Science or related field
  • 8 + years of relevant experience
  • Offensive Security Certified Professional (OSCP)
  • Proven experience leading and executing Red Team operations and adversary simulations
  • Advanced skills across network, application, cloud, wireless, and hybrid penetration testing
  • Strong command of the exploitation lifecycle (reconnaissance, initial access, persistence, privilege escalation, lateral movement, data exfiltration)
  • Experience with Active Directory exploitation, Linux privilege escalation, kernel‑level techniques, and cloud identity systems
  • Ability to chain vulnerabilities and bypass modern endpoint detection technologies
  • Proficiency with Red Team tooling,…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary