National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Senior Red Team Operator

Verizon
London
3 days ago
Create job alert

Join to apply for the Senior Red Team Operator role at Verizon
3 days ago Be among the first 25 applicants
Join to apply for the Senior Red Team Operator role at Verizon
Get AI-powered advice on this job and more exclusive features.
When you join Verizon

You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife.

Verizon is seeking a highly experienced and motivated Senior Red Team Operator to join our elite cybersecurity team. The ideal candidate will possess dedicated experience in planning and executing complex Threat Intel driven Red Team or even better Tiber engagements against mature enterprise environments. This role requires a deep understanding of adversary TTPs, advanced penetration testing techniques, stealth operations, and the ability to emulate sophisticated threat actors to assess and improve our organization's security posture. The successful candidate will hold relevant advanced offensive security certifications and demonstrate a passion for continuous learning and pushing the boundaries of cybersecurity.

Key Responsibilities

Plan, coordinate, and execute full-lifecycle Red Team operations, from initial reconnaissance and C2 setup through to lateral movement, privilege escalation, objective completion, and exfiltration, while maintaining stealth and adhering to strict rules of engagement.
Emulate the tactics, techniques, and procedures (TTPs) of known advanced persistent threats (APTs) and other sophisticated threat actors relevant to our industry and threat landscape.
Develop, modify, and deploy custom tools, scripts, and exploits to bypass advanced security controls (e.g., EDR, NDR, WAFs, application whitelisting) and achieve engagement objectives. Proficiency in languages such as Python, PowerShell, C#, Go, or Nim is expected.
Establish and manage covert command and control (C2) infrastructure, utilizing industry-standard frameworks (e.g., Cobalt Strike) and custom solutions, ensuring operational security throughout engagements.
Produce comprehensive and actionable reports detailing attack narratives, vulnerabilities exploited, business impact, and strategic recommendations for remediation and security posture improvement. Effectively communicate findings and insights to both technical and executive audiences.
Actively research and leverage threat intelligence to inform engagement planning, TTP selection, and adversary emulation strategies.
Collaborate with Blue Teams/Defensive Teams during Purple Team exercises or post-engagement debriefs to improve detection and response capabilities.
Mentor junior team members and contribute to the continuous improvement of the Red Team's methodologies and tradecraft.

You’ll Need To Have

Experience as an Offensive Security cybersecurity professional and a few years as a dedicated, hands-on experience in conducting Red Team operations against diverse and complex enterprise environments. This experience must include leading or playing a significant role in multi-faceted engagements.
Deep understanding and practical application of Active Directory (AD) exploitation techniques, including lateral movement, privilege escalation, persistence mechanisms, and defence evasion in Windows-dominated enterprise environments.
Proficiency with common Red Team tools and C2 frameworks (e.g., Cobalt Strike, Brute Ratel, Havoc, or similar).
Strong knowledge of network protocols (TCP/IP, DNS, HTTP/S, etc.), operating system internals (Windows, Linux), and web application security vulnerabilities and exploitation techniques.
Demonstrable experience with scripting and/or programming languages (e.g., Python, PowerShell, C#, Go, Nim) for task automation, tool development, and exploit customization.
Familiarity with the MITRE ATT&CK framework and its practical application in planning, executing, and reporting on adversary emulation engagements.
Thorough understanding of the cyber attack lifecycle, modern offensive TTPs, threat actor methodologies, and common security architectures and their weaknesses
One or more of the following certifications are highly desirable:
Offensive Security Experienced Pentester (OSEP)
GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
Certified Red Team Expert (CRTE)
Certified Red Team Operator (CRTO)
Offensive Security Certified Expert 3 (OSCE³)
Offensive Security Certified Professional (OSCP) (considered a foundational baseline)
Other relevant advanced certifications (e.g., cloud-specific like GCPN, CARTP, or exploit development like OSED) will be considered.

Even Better If You Have

Exceptional problem-solving skills and a highly analytical, attacker-like mindset.
Proven ability to think creatively, adapt to evolving challenges, and overcome sophisticated defensive measures.
Excellent written and verbal communication skills, with the ability to articulate complex technical concepts and findings clearly and concisely to diverse audiences, including technical staff and executive leadership.
Unwavering ethics, integrity, and professionalism in handling sensitive information and conducting all engagements.
Self-motivated and resourceful, with the ability to work effectively independently on complex tasks and collaboratively as part of a high-performing team.
A strong commitment to continuous learning, research, and staying abreast of the latest offensive security TTPs, vulnerabilities, tools, and defensive technologies.

What We Offer

Opportunities to conduct challenging and impactful Red Team engagements against a variety of mature and complex target environments.
A supportive culture that fosters continuous learning and professional development, including support for advanced training and certifications.
Competitive salary, performance-based bonuses, and comprehensive benefits package.
Access to leading-edge Red Teaming tools, technologies, and lab environments.
A collaborative and stimulating team environment, working alongside highly skilled and passionate cybersecurity professionals.

Where you’ll be working

In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager.

Scheduled Weekly Hours

40

Equal Employment Opportunity

Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics.
Seniority level Seniority level Associate
Employment type Employment type Full-time
Job function Job function Management and Manufacturing
Industries IT Services and IT Consulting
Referrals increase your chances of interviewing at Verizon by 2x
Sign in to set job alerts for “Senior Operator” roles. NEW OPENING Restaurant and Bar General Manager, London : A GBP 90/95,000k Hackney, England, United Kingdom 2 weeks ago
Greenford, England, United Kingdom 2 days ago
Enfield, England, United Kingdom 1 week ago
London, England, United Kingdom 2 weeks ago
Brent, England, United Kingdom 1 week ago
London, England, United Kingdom 2 days ago
Slough, England, United Kingdom 3 days ago
London, England, United Kingdom 2 weeks ago
Downstream Market and Strategy Manager Operator London, England, United Kingdom 3 days ago
Harrow, England, United Kingdom 2 days ago
London, England, United Kingdom 3 weeks ago
Senior Global Director of Asset Management International Security Operations Centre (ISOC) Operator London, England, United Kingdom 1 week ago
Revenue Optimisation Manager - Battery Energy Storage Solutions London, England, United Kingdom 1 week ago
London, England, United Kingdom 2 weeks ago
Asset Manager - Offshore Power Transmission London, England, United Kingdom 3 weeks ago
Asset Revenue Optimisation Manager - Battery Energy Storage Solutions City Of London, England, United Kingdom 1 week ago
Lead Revenue Manager - Battery Energy Storage Solutions London, England, United Kingdom 2 months ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr

Related Jobs

View all jobs

Senior Red Team Operator

Senior Security Engineer, Red Team

Senior Security Engineer, Red Team...

Senior Security Engineer, Red Team

Senior Security Engineer, Red Team

Senior Penetration Tester/ Check Team Lead

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.

Cyber Security Jobs Employer Hotlist 2025: 50 UK Companies Actively Hiring Right Now

Bookmark this guide—refreshed every quarter—so you always know who’s really expanding their cyber security teams. Ransomware payouts broke records in 2024, the UK’s new Cyber Security Bill imposed mandatory breach disclosure, and the National Cyber Force’s move to Samlesbury has super‑charged the northern skills market. Result? Demand for security architects, SOC analysts, penetration testers, cloud‑security engineers, threat hunters & GRC specialists is at an all‑time high in 2025. Below you’ll find 50 organisations that have posted UK‑based cyber security vacancies or announced head‑count growth during the past eight weeks. They’re organised into five quick‑scan categories. For every employer you’ll see: Main UK hub Example live or recent vacancy Why it’s worth a look (tech stack, culture, mission) Search any company on CyberSecurityJobs.tech to view current ads, or set a free alert so fresh openings land straight in your inbox.

Return-to-Work Pathways: Relaunch Your Cyber Security Career with Returnships, Flexible & Hybrid Roles

Re-entering the workforce after a career break can feel especially challenging in a fast-moving field like cyber security. Whether you stepped away for parenting, caregiving or another life chapter, the UK’s cyber security sector now offers a range of return-to-work pathways—from structured returnships to flexible and hybrid roles. These programmes value the transferable skills and resilience you’ve developed during your break, pairing you with mentorship, upskilling opportunities and supportive networks to ease your transition back into cyber security. In this article, tailored for parents and carers, you’ll discover how to: Understand the growing demand for cyber security talent in the UK Translate your organisational, communication and problem-solving skills into cyber security roles Tackle common re-entry challenges with practical solutions Refresh your technical knowledge through targeted learning Access returnship and re-entry programmes specific to cyber security Find roles that accommodate family commitments—whether hybrid, flexible or full-time Balance your career relaunch with caring responsibilities Master applications, interviews and networking in cyber security Draw inspiration from real returner success stories Whether you aim to return as an analyst, penetration tester, security engineer or compliance specialist, this guide will equip you with the steps and resources to reignite your cyber security career.