Red Team Operator - 6-month contract (Inside IR35) - Hybrid, Central London (x2)

Red Team Operator - 6-month contract (Inside IR35) - Hybrid, Central London (x2)

Posted Today by Futureheads Recruitment | B Corp™

Negotiable
Inside
Hybrid
London Area, United Kingdom

Summary: The Red Team Operator role involves hands-on offensive security operations, focusing on adversary emulation and capability validation within a financial sector consultancy. The position requires planning and executing red team engagements while collaborating with blue teams and mentoring junior members. This is a 6-month contract based in Central London, classified as inside IR35.

Key Responsibilities:

  • Plan and execute red team engagements including phishing, AD exploitation, lateral movement and persistence.
  • Develop and maintain tooling, scripts and exploitation chains; document TTPs and evidence.
  • Work closely with blue teams to validate detections and support purple-team exercises.
  • Mentor junior red-team members and contribute to training material and playbooks.
  • Participate in scheduling and coordination of windows for safe testing in production and non-production environments.

Key Skills:

  • 3+ years’ offensive security / red team / advanced penetration testing experience.
  • Strong Windows AD, Linux, scripting and post-exploitation skills.
  • Familiarity with automated breach platforms and strong working knowledge of MITRE ATT&CK for emulation mapping.

Salary (Rate): undetermined

City: London

Country: United Kingdom

Working Arrangements: hybrid

IR35 Status: inside IR35

Seniority Level: undetermined

Industry: IT

Detailed Description From Employer:

Red Team Operator - 6-month contract (Inside IR35) - Hybrid, Central London (x2) I am working with a global consultancy who have partnered up with a company in the financial sector, looking for 2 Red Team Operators to join their expanding team.

Overview: Hands-on offensive security operator to plan and execute realistic adversary emulation and support capability validation across detection and response teams.

Key responsibilities

  • Plan and execute red team engagements including phishing, AD exploitation, lateral movement and persistence.
  • Develop and maintain tooling, scripts and exploitation chains; document TTPs and evidence.
  • Work closely with blue teams to validate detections and support purple-team exercises.
  • Mentor junior red-team members and contribute to training material and playbooks.
  • Participate in scheduling and coordination of windows for safe testing in production and non-production environments.

Must have 3+ years’ offensive security / red team / advanced penetration testing experience. Strong Windows AD, Linux, scripting and post-exploitation skills.

Nice to have Familiarity with automated breach platforms and strong working knowledge of MITRE ATT&CK for emulation mapping.