Principal Security Consultant (Red Team)

Claranet
remote, gb
10 months ago
Create job alert

About The Role

Our consultants work on everything from client projects to development work and training, dealing with large corporate penetration tests to gaining credit for published advisories. Technical excellence and customer service are key to our work, you will be passionate about finding vulnerabilities while being happy liaising with customers.

Our team is growing, and we need inspiring people to join us and help us to continue to build a world leading cyber security operation whilst benefiting from the opportunity to fulfil their potential.

Based in INDIA, this work will lead on Red Team projects, including threat hunting work, but will have the opportunity to work on projects with worldwide clients, and will form part of our global team of penetration testers who share research, tooling, experience and collaborate freely on projects.

As a respected training provider and the leading provider of training at Black Hat conferences, our penetration testers also have the option of developing training skills and delivering security training, to both private customers, at our own events, and at leading international conferences.

Essential duties & responsibilities:

Plan and execute red team assessments to simulate real-world attack scenarios. Conduct thorough and realistic red team assessments to identify vulnerabilities in our organization's infrastructure, systems, and applications. Collaborate closely with the security team and other stakeholders to define objectives and scope of red team engagements. Research and stay up-to-date with the latest attack techniques, tools, and emerging threats to enhance the effectiveness of red teaming activities. Develop and execute comprehensive attack scenarios that simulate sophisticated, multi-stage cyber attacks. Utilize a variety of tools, technologies, and methodologies to mimic real-world attack vectors, such as social engineering, network exploitation, web application vulnerabilities, and lateral movement. Assess the effectiveness of security controls, incident response procedures, and other defensive measures during red team engagements. Document and communicate findings, including identified vulnerabilities, attack paths, and recommended remediation measures, in clear and concise reports. Collaborate with the security team and relevant stakeholders to prioritize and address identified vulnerabilities and weaknesses. Continuously enhance red teaming methodologies, tools, and processes to keep pace with evolving threats and industry best practices. Contribute to improving the organization’s overall security posture by providing guidance, expertise, and training to staff members.

About You

Essential:7+ years of experience in information security 4+ years of client-facing consulting work experience performing penetration testing. Familiarity with common attack vectors, tools, and techniques used by threat actors. Develop a comprehensive test plan, including goals, targets, and tactics to mimic real-world cyber threats. Conduct simulated cyberattacks, such as phishing, penetration testing, social engineering, and more, to identify vulnerabilities. Utilize a wide range of hacking techniques and tools to exploit weaknesses in the organization's defenses. Proficiency in programming and scripting languages (e.g., Python, PowerShell, Ruby). Strong understanding of network protocols, web applications, and cloud technologies. Certifications such as Offensive Security Certified Professional (OSCP) or Certified Ethical Hacker (CEH) are a plus. Ability to work independently and as part of a collaborative team, managing multiple engagements simultaneously and meeting deadlines. Strong knowledge of various operating systems, network protocols, and security technologies. Assess and enhance the effectiveness of red team methodologies and processes. Proficiency in using a wide range of offensive security tools, frameworks, and scripting languages (e.g., Metasploit, Cobalt Strike, PowerShell, ) to simulate attacks. Excellent analytical and problem-solving skills. Excellent communication skills (written and verbal) with an ability to explain complex topics in a clear and concise manner to both technical and non-technical audiences  Stay proactive in identifying new attack vectors and techniques. Knowledge of cloud services and cloud security controls 

Related Jobs

View all jobs

Principal Security Consultant

Principal Security Consultant

Principal Security Consultant

Principal Security Consultant (Red Team)

Principal Cyber Security Consultant

Principal Cyber Security Consultant

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Contract vs Permanent Cybersecurity Jobs: Which Pays Better in 2025?

Cybersecurity has become one of the fastest-growing and most crucial fields in modern business. With high-profile breaches dominating headlines and the ongoing digital transformation exposing organisations to new threats, companies across the UK are competing to attract skilled cybersecurity professionals. Roles range from penetration testers (pen testers) and SOC (Security Operations Centre) analysts to compliance officers, cloud security architects, threat intelligence analysts, and CISOs (Chief Information Security Officers). As demand continues to surge, cybersecurity salaries have climbed accordingly, and businesses have turned to more flexible hiring practices. Alongside permanent employment, many professionals explore short-term day‑rate contracting or fixed-term contracts (FTCs), searching for the ideal balance of pay, job security, and growth opportunities. Which arrangement truly pays better in 2025—and which best aligns with your ambitions? In this article, we dive into the contract vs. permanent debate with a focus on cybersecurity roles. We will examine the current market, the structure of day‑rate vs. FTC vs. permanent positions, the pros and cons of each, and some hypothetical pay comparisons. By the end, you should have a clearer sense of which career path might suit your situation and goals—whether you are a seasoned specialist aiming for top rates, or an up-and-coming analyst seeking a stable environment to develop in.

Cyber Security Jobs for Non‑Technical Professionals: Where Do You Fit In?

Defence Needs More Than Hackers in Hoodies When headlines warn of ransomware crippling hospitals or deepfakes swaying elections, we picture hoodie‑clad hackers and elite penetration testers. Yet the reality of the UK’s cyber security sector is broader—and desperately short of talent. The Department for Science, Innovation & Technology (DSIT) estimates a shortfall of 11,200 cyber security professionals in 2024, while 43 % of advertised roles require governance, risk or communication skills rather than hands‑on technical exploits. Put plainly: if you can guide policy, manage projects, interpret regulations or inspire behaviour change, cyber security wants you. This guide highlights the fastest‑growing non‑technical roles, the transferable skills you already possess, and a concrete 90‑day plan to land a cyber security job—no packet sniffers required.

BAE Systems Cybersecurity Jobs in 2025: Your Complete UK Guide to Protecting Governments, Businesses and Critical Infrastructure

From securing the Royal Navy’s new Dreadnought submarines to foiling multimillion‑pound fraud rings, BAE Systems Digital Intelligence (DI)—formerly Detica—sits at the sharp end of global cyber defence. Head‑quartered in Guildford with hubs in Gloucester, Leeds and London, the 5,500‑strong DI business delivers threat‑intelligence platforms, secure‑by‑design software and 24/7 SOC services to government and commercial clients worldwide. With escalating ransomware, AI‑driven disinformation and complex supply‑chain threats, BAE plans to expand its UK cyber workforce by 20 % in 2025. Whether you’re a graduate passionate about reverse engineering, a DevSecOps engineer who loves IaC, or an incident‑response pro comfortable in high‑side environments, this guide explains how to land a BAE Systems cybersecurity job in 2025.