Question
Full-time
2-5

Red Team Specialist

8/13/2025

The Red Team Specialist will conduct extensive OSINT gathering, develop and execute phishing campaigns, and perform in-depth assessments of applications and infrastructure. They will also create detailed reports on findings and stay updated with the latest threats and attack techniques.

Working Hours

40 hours/week

Language

English

Visa Sponsorship

No

About The Company

No description available for this Company.

About the Role

Job Overview: We are seeking a skilled and experienced Red Team Specialist with a strong background in OSINT, phishing/smishing/vishing campaigns, application and infrastructure penetration testing, and low-level programming, to join our Offensive Security team. The ideal candidate has a solid understanding of advanced offensive techniques, malware development, and threat emulation, and is capable of conducting sophisticated attacks that simulate real-world threat scenarios to evaluate and improve the security defenses of our clients.

Key Responsibilities:

  • OSINT and Target Reconnaissance: Conduct extensive Open Source Intelligence (OSINT) gathering to map potential attack surfaces and identify key information that could be leveraged in red team operations.
  • Phishing and Social Engineering: Develop and execute phishing campaigns (using text and/or voice) and other social engineering tactics to simulate realistic attack scenarios. Measure effectiveness and provide insights into user awareness and susceptibility.
  • Application and Infrastructure Testing: Perform in-depth assessments of web applications, APIs, and infrastructure, identifying vulnerabilities that could be exploited by adversaries. Focus on both external and internal assets.
  • Malware Development and Low-Level Exploitation: Develop and deploy custom malware, exploits, or payloads tailored to the engagement requirements. Utilize low-level programming (e.g., C, C++, Assembly) to create effective evasion techniques and bypass security controls.
  • Collaboration and Reporting: Create detailed technical reports on findings, as well as high-level summaries for senior leadership of our clients.
  • Tool Development and Automation: Build and customize tools and scripts for automation in reconnaissance, exploitation, and post-exploitation phases, enhancing red team effectiveness.
  • Stay Up-to-Date with Threat Landscape: Stay informed on the latest threats, exploits, and attack techniques, incorporating them into the red team operations.

Requirements

  • Experience: 3-5 years of hands-on experience in red teaming or offensive security roles, with a focus on OSINT, social engineering, and phishing.
  • Technical Proficiency:
  • Strong understanding of network and application layer protocols and security principles.
  • Proficiency in offensive security tools (e.g., Cobalt Strike, Empire, Metasploit, Burp Suite) and scripting languages (Python, PowerShell, Bash).
  • Demonstrable experience with low-level programming (C, C++, Assembly) for exploit development and evasion techniques.
  • Malware Development: Experience developing custom malware and payloads to simulate APT behavior and bypass security defenses.
  • Social Engineering Skills: Expertise in creating and executing phishing campaigns, phone-based social engineering, and physical security assessments.
  • Application and Infrastructure Knowledge: Deep understanding of web application security, including hands-on experience with typical vulnerabilities, as well as infrastructure vulnerabilities in Windows, Linux, and cloud environments.
  • Strong OSINT Skills: Proven track record of gathering and leveraging OSINT to enhance attack precision and effectiveness.

Nice to Have

  • Reverse Engineering: Familiarity with reverse engineering tools (e.g., IDA Pro, Ghidra, OllyDbg) and methodologies for understanding binaries and malware.
  • Certifications (preferred): OSCP, OSCE, CRTO, or other advanced offensive security certifications that demonstrate deep technical expertise.
  • Good verbal and written English (at least CEFR level B2).

Soft Skills:

  • Adaptability and Innovation: Ability to think creatively and adapt techniques based on different scenarios and evolving security measures.
  • Clear Communication: Capable of documenting complex technical findings and communicating them effectively to technical and non-technical stakeholders.
  • Problem-Solving and Analytical Mindset: Strong analytical skills with a methodical approach to problem-solving in offensive security contexts.
  • Excellent communication skills.
Key Skills
OSINTPhishingSocial EngineeringPenetration TestingMalware DevelopmentLow-Level ProgrammingApplication SecurityInfrastructure SecurityThreat EmulationTool DevelopmentAutomationAnalytical SkillsCommunication SkillsProblem-SolvingAdaptabilityInnovation
Apply Now

Please let HUB Technologies know you found this job on PrepPal. This helps us grow!

Apply Now
Get Ready for the Interview!

Do you know that we have special program that includes "Interview questions that asked by HUB Technologies?"

Elevate your application

Generate a resume, cover letter, or prepare with our AI mock interviewer tailored to this job's requirements.