Harvey Nash
Ethical Hacker
Harvey NashNetherlands2 days ago
ContractInformation Technology

🔴 Adversary Emulation Operator (Red Team)

🛡️ Cyber Security | Red Team | Ethical Hacking


Our client, a leading global company in the payments sector, is strengthening its offensive security capabilities and is looking for an Adversary Emulation Operator to join its Red Team.

This is not a checkbox penetration testing role. You’ll be part of a team that thinks and operates like real attackers, executing intelligence-driven campaigns that simulate criminal, nation-state, and insider threats to proactively improve defensive capabilities.


If you regularly read about real-world breaches and think “I would have done this differently”, this role is for you.


🔍 The Role

You will plan and execute advanced Red Team and adversary emulation operations, operating with a high degree of independence while collaborating closely with Blue and Purple Teams. Your work will directly influence detection, response, and resilience across a complex global environment.


This role emphasizes:

  • Realistic attack simulation
  • Outcome-focused campaigns
  • Continuous evolution of tactics and techniques
  • Clear communication of risk to the business


🛠️ Key Responsibilities

  • Develop and execute exploitation scenarios across network, application, mobile, wireless, and cloud environments
  • Translate threat intelligence into realistic, repeatable attack campaigns mapped to real threat actors
  • Continuously evolve Red Team Tactics, Techniques, and Procedures (TTPs) to reflect real-world adversaries
  • Conduct phishing, OSINT-driven social engineering, and physical security assessments (including RF site surveys)
  • Develop and refine payloads and attack paths across enterprise infrastructure
  • Chain vulnerabilities to achieve privilege escalation and lateral movement
  • Clearly document technical findings, remediation recommendations, and business impact
  • Support Purple Teaming by working closely with the SOC to identify and remediate detection gaps
  • Share tools, techniques, and lessons learned with Red Team peers


🎓 Education & Experience

  • University degree in Computer Science, Cyber Security, or related field — or equivalent practical experience
  • 4–5 years of hands-on experience in Penetration Testing and/or Red Team operations


📜 Certifications (one or more)

  • OSCP or higher Offensive Security certification
  • CRTO (Certified Red Team Operator)
  • SANS GXPN


🧠 Competency Profile

  • Strong team mindset with the ability to operate independently across campaign phases
  • Deep understanding of attacker tradecraft and kill chains
  • Excellent technical documentation skills for senior and stakeholder review
  • Strong knowledge of enterprise technologies such as:
  • Windows & Linux
  • Active Directory
  • Cloud environments
  • Enterprise security controls

Key Skills

Ranked by relevance