Role: Lead Red Team Engineer / Offensive Security Specialist Job Summary We are looking for a seasoned Offensive Security professional to lead and execute sophisticated Red Team engagements. The ideal candidate will simulate real-world cyber-attacks to test the resilience of our enterprise defenses, identify detection gaps, and collaborate with Blue Teams to harden our security posture.Key Accountabilities (Duties & Responsibilities) Adversary Simulation:Plan and execute end-to-end Red Team engagements simulating real-world threat actors, attack paths, and tactics aligned with theMITRE ATT&CKframework. Advanced Penetration Testing:Conduct deep-dive security assessments across web applications, APIs, mobile apps, internal/external networks, and cloud environments. Social Engineering:Design and execute authorized simulations, including phishing and pretexting, to evaluate the "human element" of security. Exploitation & Lateral Movement:Perform advanced privilege escalation, lateral movement, and post-exploitation activities within controlled environments. Defensive Validation:Validate the effectiveness of security controls such asEDR, SIEM, SOAR, WAF, and IAM ; provide actionable feedback to Blue and Purple teams. Tooling & Automation:Setup, customize, and enhance Red Team lab infrastructure. Develop or modify custom scripts, payloads, and exploits to bypass modern security controls. Threat Intelligence Integration:Develop attack scenarios based on current global threat updates and business-specific risks.Technical Knowledge & Expertise Frameworks:Mastery of the MITRE ATT&CK Framework and Cyber Kill Chain. Offensive Tooling:Expert-level proficiency with tools likeCobalt Strike , Metasploit, Burp Suite, Nmap, BloodHound, CrackMapExec, PowerSploit, Mimikatz, and Impacket. Infrastructure Security:Deep experience inActive Directorysecurity testing, authentication service exploitation, and OSINT gathering. Programming & Scripting:*Scripting:Python or PowerShell for utility and tool development. Programming:Knowledge of C / C++ for exploit modification. Systems & Networking:Strong understanding of system internals, OSI layers, and complex application architectures.Key Attributes (Experience & Qualifications) Education:BE/B.Tech/ME/M.Tech/MCA/MS from a reputed/recognized institute. Experience:* 8–12 years of total experience in IT or Information Security. At least 4–5 years of dedicated experience inPenetration Testing / Ethical Hacking / Red Teaming . Certifications:Mandatory offensive security certifications such asOSCP, OSCE, CRTP, CRTE, or CEH . Standards:Thorough knowledge of global Information Security standards and penetration testing methodologies.
Job Title
Lead -Red Team