What are the responsibilities and job description for the Red Team Operator position at Systellar Technologies?
Job Description
Job Description
Job Overview : Red Team Operator
Job Title : Red Team Operator
Location : New York, NY, United States (Remote Option Available)
Duration : 6 months to start, with potential for extension or conversion
Role Summary :
This is a senior-level position that involves conducting advanced adversary emulation operations within real-world environments. The Red Team Operator will lead a small team, overseeing operation design, execution, and decision-making. Key to this role is achieving designated objectives within timelines, consistent communication with leadership, and delivering detailed, actionable reports for varied audiences. The role also offers an opportunity to elevate team capabilities through technical mentorship, tool enhancement, and operational advancements.
Key Responsibilities :
Lead advanced Red Team engagements to simulate adversarial behaviors against real-world targets.
Design and implement comprehensive operations, ensuring objectives are met within deadlines.
Develop detailed technical reports and executive-level presentations on findings and outcomes.
Create realistic scenarios and artifacts that mirror adversary tactics for simulation exercises.
Enhance team processes through improvements to techniques, tactics, procedures, tooling, and infrastructure.
Mentor and support Red Team operators to bolster individual and team performance.
Ensure operational and post-operational activities comply with set standards and timelines.
Basic Qualifications :
Experience :
10 years in cybersecurity roles.
5 years conducting Red Teaming, Purple Teaming, Penetration Testing, or tool development.
Hands-on experience in Red Team engagements across multiple stages (Recon, Exploitation, Persistence, etc.).
Demonstrated ability to plan and lead full-scope engagements and explain operational tools and techniques while maintaining OPSEC.
Technical Knowledge :
Proficiency in Penetration Testing and Red Team tools, such as Burp Suite, Cobalt Strike, Kali Linux, and other open-source hacking platforms.
Hands-on experience with Command-and-Control frameworks, infrastructure deployment, Active Directory, data obfuscation, and authentication mechanisms.
Skilled in exploit development on Windows and Linux environments, along with OPSEC-specific infrastructure using tools like Docker or Redirectors.
Education :
Bachelor's degree in Computer Science, Information Technology, Engineering, or equivalent.
Clearance :
Ability to obtain and maintain Public Trust or Suitability / Fitness determination (as required by the client).
Additional Qualifications :
Experience with wireless and RF technologies (e.g., Bluetooth, 802.11).
Rapid offensive tool and tradecraft development capabilities.
Knowledge of phishing and social engineering tactics.
Exposure to assembly languages (x86) and reverse engineering methods.
Relevant certifications like CISSP, CEH, OSCP, CRTO, GPEN, GXPN, OSCE, OSWE, GCIH, or GWAPT.
Desired Technical Skills :
Offensive Security and Malware Development expertise.
Familiarity with OPSEC requirements and methodologies.
Experience with Offensive Security tools and techniques, including Kali Linux and Cobalt Strike.
Knowledge of cyber standards and secure operational practices.
Additional Details :
Eligibility : Candidates must be authorized to work in the United States. A background check may be required for contractor roles, including remote positions.
This role is designed for professionals passionate about red team operations and seeking an influential leadership position to drive innovation, mentor teams, and deliver impactful outcomes in cybersecurity engagements.