National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Senior Red Team Operator

Iceberg
Liverpool
1 month ago
Applications closed

Related Jobs

View all jobs

Senior Cloud Security Engineer

Senior Penetration Tester

Senior Penetration Tester

Senior Penetration Tester

Senior Application Security Engineer

BDO Digital Senior Offensive Security Analyst

Senior Red Team Engineer


Location:United States (Remote)


A global financial institution is hiring a Senior Red Team Engineer to join its internal offensive security team. This is a rare opportunity to work in a mature, highly capable global red team that focuses exclusively on real-world adversary simulation — not generic pen testing.

You’ll be responsible for leading and executing sophisticated red team operations across the bank’s global footprint. The team operates with full scope: endpoint, network, application, cloud, physical, and human-based vectors. You should bring a deep understanding of attacker tradecraft, be comfortable building your own tooling when needed, and have the mindset of someone who enjoys thinking like an adversary — not just scanning for vulnerabilities.


We’re looking for someone with real depth in at least one area of red teaming (e.g., evasive payload development, infrastructure, Windows internals, social engineering, etc.). This is a hands-on technical role, suited to someone who has already spent several years in dedicated offensive roles and wants to operate in a high-trust, high-impact environment.


What you’ll be doing:

  • Designing and delivering full kill-chain red team operations targeting enterprise assets and staff
  • Emulating real-world APT behavior, including custom tooling, C2 infrastructure, lateral movement, and exfiltration
  • Working closely with detection and response teams to test visibility and improve resilience
  • Leading campaign design, execution, and reporting, with a focus on realism and impact
  • Creating or modifying tools, exploits, and payloads as needed — not relying solely on off-the-shelf frameworks
  • Supporting threat-led testing programs and integrating threat intelligence into operations
  • Maintaining strict operational security and professional discipline in all activities


What we’re looking for:

  • 3–4+ years of true red teaming experience (not general pen testing)
  • A deep skillset in one or more areas: evasions, custom malware, cloud red teaming, physical access, phishing infrastructure, or post-exploitation
  • Strong scripting or development background (e.g., Python, Go, C#, or C)
  • Experience with major red team frameworks (e.g., Sliver, Mythic, Cobalt Strike) and a willingness to go beyond them
  • Familiarity with adversary emulation frameworks and MITRE ATT&CK
  • Exposure to social engineering or physical red teaming is a strong bonus
  • A calm, pragmatic communicator who can write clearly and explain technical risk to a non-technical audience
  • High level of personal ownership, operational maturity, and discretion


This is an opportunity to work in one of the most well-resourced offensive security programs in financial services, with global scope, freedom to innovate, and a mission-critical mandate.

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Jobs Skills Radar 2026: Emerging Frameworks, Tools & Certifications to Learn Now

Cyber threats are evolving—and so must the people defending against them. As ransomware, AI-enhanced phishing, and supply chain attacks grow more advanced, UK employers are urgently hiring cyber security professionals with the right mix of strategic and hands-on skills. Welcome to the Cyber Security Jobs Skills Radar 2026, your go-to guide for the most in-demand tools, frameworks, certifications, and technologies shaping the UK's cyber workforce. Whether you're a SOC analyst, penetration tester, or cloud security architect, this annual radar is designed to help you stay ahead of the market.

How to Find Hidden Cyber Security Jobs in the UK Using Professional Bodies like BCS, CIISec & More

The demand for skilled cyber security professionals in the UK has never been higher. With threats increasing in sophistication and frequency, organisations are urgently hiring ethical hackers, threat analysts, GRC specialists, and security architects. But many of the most valuable roles—particularly in government, defence, and critical infrastructure—are never publicly advertised. Instead, these jobs are shared behind the scenes through trusted networks, private communities, and professional bodies. In this article, we explore how to uncover hidden cyber security jobs in the UK using organisations like the BCS (The Chartered Institute for IT), CIISec (The Chartered Institute of Information Security), ISACA, and ISC² UK Chapter. We’ll show you how to use membership directories, special interest groups, CPD events and informal networks to gain early access to roles most people never see.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.