Red Team Project Manager

London
1 year ago
Applications closed

Related Jobs

View all jobs

Senior Customer Deployment Specialist

Test and Testability

Test and Testability Expert

Senior Red Team Security Consultant - CBEST, CCSAS

CERT Incident Responder

Recruitment Consultant - Cyber Security | Cheltenham | Contract

Role Overview:

We are seeking a highly organised and efficient Red Team Project Manager (Operational Lead) to oversee the day-to-day operations of our penetration testing engagements. This role will focus on managing the operational and administrative aspects of red team operations, allowing our technical team to focus on delivering high-quality security testing for our clients. The ideal candidate will be an excellent communicator with strong project management skills and a keen eye for detail, ensuring smooth coordination across multiple clients and engagements.

Key Responsibilities:

Engagement & Project Management:
Manage and track multiple red team penetration testing engagements, ensuring timely delivery and client satisfaction.
Maintain a clear schedule of all engagements, track project milestones and provide progress updates to the Head of Offensive Security.
Coordinate with internal and client teams to ensure all access requirements and testing needs are met.
Scoping & Client Interaction:
Attend and take comprehensive notes during scoping calls with clients to ensure all engagement requirements are captured.
Follow up with clients to clarify or gather any missing information or access requirements.
Serve as the point of contact for clients on non-technical matters, ensuring seamless communication and setting client expectations.
Documentation & Reporting:
Oversee the creation and maintenance of detailed engagement documentation, including scheduling, scoping, access and project status.
Assist with report Quality Assurance (QA), ensuring all deliverables meet the necessary standards before they are sent to clients.
Track and ensure that all engagements adhere to the established processes and timelines.
Scheduling & Coordination:
Maintain and manage the red team's penetration testing calendar, ensuring that engagements are appropriately scheduled and resources are allocated efficiently.
Coordinate team schedules, ensuring that members are aligned with their engagements and that project timelines are met.
CRM & Administrative Support:
Manage CRM to track client interactions, engagement statuses and ensure client records are up-to-date.
Organise and maintain internal drive or other document storage systems for project files, client reports and other relevant documentation.
Manage the day-to-day administrative needs of the red team, including team tracking, equipment management and logistics.
Team Support & Development:
Serve as a point of contact for team members regarding operational matters.
Help identify resource gaps, assist with recruitment efforts and contribute to the development of internal processes to optimize team performance.Required Skills & Experience:

Project Management Experience: Proven experience in project management, preferably within cybersecurity, IT, or technical industries.
Excellent Communication Skills: Strong verbal and written communication skills, with the ability to clearly explain complex ideas and technical details to non-technical stakeholders.
Organisational Expertise: Ability to multitask, prioritise and stay organised in a fast-paced environment with shifting priorities.
Team Collaboration: Ability to work collaboratively with technical teams, clients, and stakeholders, ensuring the smooth operation of engagements.
Detail-Oriented: Strong attention to detail, especially in documentation, scheduling and quality assurance processes.
Problem-Solving: Ability to anticipate operational challenges and develop effective solutions to keep projects on track.
Cybersecurity Awareness (Preferred): While technical knowledge is not a requirement, a basic understanding of cybersecurity concepts and penetration testing processes would be an advantage.Desirable Traits:

Proactive Attitude: Self-starter with the ability to take initiative and work independently with minimal supervision.
Leadership Potential: Ability to lead and motivate teams, manage conflict and foster a collaborative environment.
Adaptability: Comfortable adapting to changing priorities and new challenges in a fast-paced industry.Education & Qualifications:

Bachelor's degree in IT/Computer Science, Business, Project Management, or a related field, or equivalent experience.
Project Management certification (e.g., PMP, Agile, Prince2) is a plus.GCS is acting as an Employment Agency in relation to this vacancy

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.