×
Register Here to Apply for Jobs or Post Jobs. X

Red Team Specialist

Job in Mission, Hidalgo County, Texas, 78512, USA
Listing for: IOActive, Inc.
Full Time position
Listed on 2025-12-02
Job specializations:
  • Engineering
    Cybersecurity, Systems Engineer
Job Description & How to Apply Below

Making the world a safer and more secure place.

It’s our mission, plain and simple. It drives everything we do – from research to client work to community involvement. And it unifies our global team into an elite force with integrity, fierce passion, and relentless creativity that doesn’t just “push the envelope” or “think outside the box.” We shred the envelope, crush the box, and we have fun doing it.

We are always looking for people who share our mission to join us.

About IOActive:

IOActive, a trusted partner for Global 1000 enterprises, provides research‑fueled security services across all industries. Our cutting‑edge cybersecurity teams provide highly specialized technical and programmatic services including full‑stack penetration testing, program efficacy assessments, and hardware hacking. IOActive brings a unique attacker’s perspective to every engagement to maximize cybersecurity investments and improve the security posture and operational resiliency of our clients. Founded in 1998, IOActive is headquartered in Seattle with global operations, including state of the art hardware hacking labs in Seattle, WA, Madrid, Spain and Cheltenham, UK.

IOActive Red Team Specialists perform multi‑vector, chained attacks that include exploitation through physical, network, web, and social engineering methods with the goal of making our clients more secure and prepared to respond to real incidents. Activities involve planning and reconnaissance to identify critical assets and potential attack paths, exploitation of vulnerabilities resulting in infiltration of the environment, acting on the objectives of the campaign through post‑exploitation, and documentation of actions and outcomes.

What you’ll do:
  • Work as part of a team performing Red and Purple Team Campaigns for IOActive clients, both remotely and on‑site
  • Perform adversarial emulation, assumed breach scenarios, post‑exploitation, social engineering, and physical security testing
  • Manage project tasks and deadlines on a multi‑time‑zone team
  • Develop unique tools to assist in project goals
  • Exploit vulnerabilities found in client’s people, processes, and technology; then clearly communicate complex vulnerabilities to both technical and non‑technical client staff
  • Create comprehensive technical reports explaining technical and business risk of the vulnerabilities found. This includes actionable recommendations/considerations for the client
  • Participate in project conference calls with clients and on business development calls in support of sales activities
  • Create and lead technical customer presentations
  • Provide technical leadership/mentorship to the consulting team and to our clients on security topics
  • Contribute to the security industry through presentations, whitepapers and/or research
What you bring:
  • Experience performing and leading covert red team operations and activities, including performing adversarial emulation, assumed breach scenarios, post‑exploitation, social engineering, and physical security testing
  • Penetration testing experience in Network, Web applications, Wireless networks, Physical security, and Social engineering
  • Experience with C2 and post‑exploitation frameworks, including Cobalt Strike, Empire, Metasploit, Throwback, and similar tools
  • Understanding and proficiency with some of the following:
    Python, Ruby, Power Shell, Java, and Shell scripting
  • Knowledge and experience with enterprise network/system/application architecture and design including complex environments utilizing Microsoft Windows, Active Directory, and Linux
  • Deep understanding on Windows and Linux systems administration and post‑exploitation activities on each platform
  • Ability to present complex material in a digestible, consumable manner to all levels of management
  • Highly experienced with OS, services, and application hardening
  • Strong ability to find vulnerabilities and develop proof of concepts
  • Ability and desire to travel at least 50% of the time – both nationally and globally
What We Offer

🎯 A chance to work with an industry leader in cyber security

💡 Access to world‑class technical teams and research

🏆 A high‑energy, collaborative team that values innovation

💻 Flexibility—work remotely…

To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary