drjobs Red Team Operator (Greece, UK, Spain, Italy, Malta)

Red Team Operator (Greece, UK, Spain, Italy, Malta)

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Athens - Greece

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Jedi Red Teamer Wanted: Harness the Force of Cybersecurity to Defend the Galaxy!

Are you passionate about offensive security and hacking So are we!

Do you get excited every time you get your reverse shell back Same here - no matter how many hundreds of times that happened!

SECFORCE is a dynamic penetration testing company with a presence in London Malta and other regions of Europe. We are here! Waiting for you!

SECFORCE is looking for a red teamer to join our industry-leading team in the UK Malta Greece Italy or Spain.

Who are we

We are a young team and we promote a fun working environment. We enjoy hacking and are passionate about security testing. However we also work hard and we believe we are one of the very best testing companies in the world. For example - we are the youngest CBEST-accredited company.

Tasks

We are looking for a passionate techie with at least 1 year of experience in the delivery of adversary emulation exercises. As such your primary function will be to execute Red and Purple Team security assessments but also deliver spear-phishing and Active Directory configuration engagements.

At SECFORCE you will be delivering simulated attack engagements of the highest calibre such as DORA TLPT TIBER-EU and CBEST.

Requirements

Required Skills:

  • Experience in adversary emulation exercises
  • Experience in phishing implant creation implant delivery Windows internals lateral movement privilege escalation cloud infrastructure exfiltration
  • Good understanding of the MITRE Attack Framework and emulation of TTPs
  • Good communication/presentation skills
  • Ability to write deliverables to a high standard (in English)
  • Ability to communicate technical findings to both board-level executives and technical teams
  • Mindset of being up-to-date with latest attack trends

Other requirements:

  • Applicants must have the legal right to work in the EU

OR

  • Applicants must have the legal right to work in the UK without sponsorship (e.g. student visa).

Nice to have:

  • Research/tools in relevant fields (e.g implant creation offensive tools public blogs/scripts)
  • Certifications (e.g. CC SAS / CCT INF / CRTE / OSCP)
  • Participation in CTF platforms (e.g. HTB THM)

Benefits

What we offer:

  • A key role in delivering adversary emulation to some of the biggest names in the industry
  • Working closely with other Red Team specialists for knowledge sharing
  • Up to 20% of your time can be spent on research/conferences/skill development
  • Hybrid to full-remote working policy
  • Relaxed working environment (no dress code you can choose the music based on your test)
  • Annual training budget
  • Frequent team events and trips

Great! Whats next

If you are passionate about offensive security please get in touch!

One piece of advice: Please dont send us the typical - boring - cover letter. We are not that kind of company. We are dynamic and fun. Send us just a paragraph describing why you are passionate and motivated about security testing what type of projects you have been involved in what excites you and what your aspirations are.

Employment Type

Employee

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.