
Red Team Operator - 6-month contract (Inside IR35) - Hybrid, Central London (x2)
Posted Today by Futureheads Recruitment | B Corp™
Negotiable
Inside
Hybrid
London Area, United Kingdom
Summary: The Red Team Operator role involves hands-on offensive security operations, focusing on adversary emulation and capability validation within a financial sector consultancy. The position requires planning and executing red team engagements while collaborating with blue teams and mentoring junior members. This is a 6-month contract based in Central London, classified as inside IR35.
Key Responsibilities:
- Plan and execute red team engagements including phishing, AD exploitation, lateral movement and persistence.
- Develop and maintain tooling, scripts and exploitation chains; document TTPs and evidence.
- Work closely with blue teams to validate detections and support purple-team exercises.
- Mentor junior red-team members and contribute to training material and playbooks.
- Participate in scheduling and coordination of windows for safe testing in production and non-production environments.
Key Skills:
- 3+ years’ offensive security / red team / advanced penetration testing experience.
- Strong Windows AD, Linux, scripting and post-exploitation skills.
- Familiarity with automated breach platforms and strong working knowledge of MITRE ATT&CK for emulation mapping.
Salary (Rate): undetermined
City: London
Country: United Kingdom
Working Arrangements: hybrid
IR35 Status: inside IR35
Seniority Level: undetermined
Industry: IT
Red Team Operator - 6-month contract (Inside IR35) - Hybrid, Central London (x2) I am working with a global consultancy who have partnered up with a company in the financial sector, looking for 2 Red Team Operators to join their expanding team.
Overview: Hands-on offensive security operator to plan and execute realistic adversary emulation and support capability validation across detection and response teams.
Key responsibilities
- Plan and execute red team engagements including phishing, AD exploitation, lateral movement and persistence.
- Develop and maintain tooling, scripts and exploitation chains; document TTPs and evidence.
- Work closely with blue teams to validate detections and support purple-team exercises.
- Mentor junior red-team members and contribute to training material and playbooks.
- Participate in scheduling and coordination of windows for safe testing in production and non-production environments.
Must have 3+ years’ offensive security / red team / advanced penetration testing experience. Strong Windows AD, Linux, scripting and post-exploitation skills.
Nice to have Familiarity with automated breach platforms and strong working knowledge of MITRE ATT&CK for emulation mapping.