Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
🔴 Adversary Emulation Operator (Red Team)
🛡️ Cyber Security | Red Team | Ethical Hacking
Our client, a leading global company in the payments sector, is strengthening its offensive security capabilities and is looking for an Adversary Emulation Operator to join its Red Team.
This is not a checkbox penetration testing role. You’ll be part of a team that thinks and operates like real attackers, executing intelligence-driven campaigns that simulate criminal, nation-state, and insider threats to proactively improve defensive capabilities.
If you regularly read about real-world breaches and think “I would have done this differently”, this role is for you.
🔍 The Role
You will plan and execute advanced Red Team and adversary emulation operations, operating with a high degree of independence while collaborating closely with Blue and Purple Teams. Your work will directly influence detection, response, and resilience across a complex global environment.
This role emphasizes:
- Realistic attack simulation
- Outcome-focused campaigns
- Continuous evolution of tactics and techniques
- Clear communication of risk to the business
🛠️ Key Responsibilities
- Develop and execute exploitation scenarios across network, application, mobile, wireless, and cloud environments
- Translate threat intelligence into realistic, repeatable attack campaigns mapped to real threat actors
- Continuously evolve Red Team Tactics, Techniques, and Procedures (TTPs) to reflect real-world adversaries
- Conduct phishing, OSINT-driven social engineering, and physical security assessments (including RF site surveys)
- Develop and refine payloads and attack paths across enterprise infrastructure
- Chain vulnerabilities to achieve privilege escalation and lateral movement
- Clearly document technical findings, remediation recommendations, and business impact
- Support Purple Teaming by working closely with the SOC to identify and remediate detection gaps
- Share tools, techniques, and lessons learned with Red Team peers
🎓 Education & Experience
- University degree in Computer Science, Cyber Security, or related field — or equivalent practical experience
- 4–5 years of hands-on experience in Penetration Testing and/or Red Team operations
📜 Certifications (one or more)
- OSCP or higher Offensive Security certification
- CRTO (Certified Red Team Operator)
- SANS GXPN
🧠 Competency Profile
- Strong team mindset with the ability to operate independently across campaign phases
- Deep understanding of attacker tradecraft and kill chains
- Excellent technical documentation skills for senior and stakeholder review
- Strong knowledge of enterprise technologies such as:
- Windows & Linux
- Active Directory
- Cloud environments
- Enterprise security controls
Key Skills
Ranked by relevanceReady to apply?
Join Harvey Nash and take your career to the next level!
Application takes less than 5 minutes

