Red Team Operator - Hybrid
Listed on 2026-02-15
-
IT/Tech
Cybersecurity, Systems Engineer
About Us
We’re the world’s leading provider of secure financial messaging services, headquartered in Belgium. We are the way the world moves value – across borders, through cities and overseas. No other organisation can address the scale, precision, pace and trust that this demands, and we’re proud to support the global economy.
We are seeking an experienced Red Team member to serve on advanced adversary emulation campaigns across our enterprise environments and conduct penetration tests independently. This role combines deep hands‑on technical execution for Red Team operations, tooling, infrastructure, and operator development. You will design and direct large‑scale adversary simulations, coordinate multi‑operator campaigns, and ensure Red Team tradecraft remains ahead of evolving organisational defenses.
You will be responsible not only for executing complex offensive operations, but also for shaping Red Team capability, mentoring operators, and translating offensive outcomes into measurable defensive improvement.
In this role you will
Red Team Operations & Campaign Leadership
- Architect and execute end‑to‑end adversary simulations across enterprise, cloud, and hybrid infrastructures
- Lead and coordinate multi‑operator exploitation teams, managing simultaneous kill chains and campaign logistics
- Direct complex Red Team engagements from reconnaissance and initial access through persistence, lateral movement, and data exfiltration
- Design and execute network, application, wireless, physical, and cloud penetration tests
- Build, operate, and maintain Red Team infrastructure, including command‑and‑control (C2) ecosystems, phishing platforms and operational security (OPSEC) tooling
- Develop and operationalize custom tooling, payloads, automation and exploitation chains
- Research and implement advanced evasion techniques against SIEM, EDR, and XDR platforms
- Ensure operational realism, safety, and compliance with internal policy, legal constraints, and regulatory requirements
- Align Red Team operations with the MITRE ATT&CK framework and threat‑led testing standards (e.g., TIBER)
- Lead Purple Team exercises and translate offensive findings into prioritized defensive improvements
- Partner with SOC, Blue Team, Threat Intelligence, Risk Management, and Engineering teams to strengthen detection and response maturity
- Mentor and develop junior and mid‑level operators, sharing techniques, lessons learned, and tooling improvements
- Interpret technical exploitation in the context of business risk and control effectiveness
- Communicate technical risk clearly to security leadership and key stakeholders
- Produce high‑quality After Action Reports (AARs), executive summaries, and technical documentation
- Leads complex Red Team engagements independently and as part of a broader campaign strategy
- Deliver realistic adversary simulations that measurably improve detection and response maturity
- Build and maintain resilient, covert Red Team infrastructure and tooling ecosystems
- Develop novel exploitation techniques that stress modern defensive controls
- Produce clear, actionable reports aligned to business risk and regulatory expectations
- Strengthen Red Team capability through mentorship, process maturity, and tradecraft standardization
- Acts as a trusted deputy and technical authority for the Senior Manager
We are seeking professionals with
- Bachelors Degree in Computer Science or related field
- 8 + years of relevant experience
- Offensive Security Certified Professional (OSCP)
- Proven experience leading and executing Red Team operations and adversary simulations
- Advanced skills across network, application, cloud, wireless, and hybrid penetration testing
- Strong command of the exploitation lifecycle (reconnaissance, initial access, persistence, privilege escalation, lateral movement, data exfiltration)
- Experience with Active Directory exploitation, Linux privilege escalation, kernel‑level techniques, and cloud identity systems
- Ability to chain vulnerabilities and bypass modern endpoint detection technologies
- Proficiency with Red Team tooling,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).