Job Description
Insight Global is seeking a remote senior Security Operations Engineer (Red Team Operator) to join the Offensive Security pillar within the Security Operations department for a global consulting firm.
This person will be responsible for planning and executing sophisticated adversary emulation engagements designed to evaluate and strengthen the organization's security posture across people, processes, and technology.
You would operate with a realistic threat-actor mindset, conducting end-to-end attack simulations that go beyond checklist-driven testing. Your work would directly inform defensive improvements and help leadership understand real-world risk. The ideal candidate brings deep technical expertise, a proven offensive security track record, and the ability to communicate complex findings to audiences at every level.
Compensation:
$13/hr to $17/hr
Exact compensation may vary based on several factors, including skills, experience, and education.
Benefit packages for this role will start on the 31st day of employment and include medical, dental, and vision insurance, as well as HSA, FSA, and DCFSA account options, and 401K retirement account access with employer matching. Employees in this role are also entitled to paid sick leave and/or other paid time off as provided by applicable law.
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.
Skills and Requirements
-5+ years of experience in red team operations, adversary simulation, or offensive cyber operations
-Strong expertise in Active Directory attacks and defenses, including domain compromise, Kerberos abuse, and trust exploitation
-Demonstrated experience with EDR evasion techniques, antivirus bypass, and operational security considerations during engagements
-Hands-on proficiency with C2 frameworks (e.g., Cobalt Strike, Mythic, Sliver, Brute Ratel) and post-exploitation tooling (e.g., BloodHound, Rubeus, Impacket)
-Understanding of network protocols, operating systems (Windows, Linux, macOS), web application security, and cloud environments
-Strong scripting and programming skills in at least two of the following: Python, PowerShell, Bash, C#, C++, Go, or Rust
-Ability to develop or modify exploits, shellcode, loaders, and payloads to circumvent defensive controls
-Deep knowledge of the MITRE ATT&CK framework and its practical application in adversary emulation
-Excellent written and verbal communication skills, with the ability to translate complex technical findings into clear, executive-level reporting -Any security certifications
-Experience targeting cloud environments (Azure, AWS, GCP)
-Previous experience in malware development, reverse engineering, or custom implant creation for covert engagements
-Track record of published security research, CVE attributions, blog posts, open-source tool contributions, or conference presentations
-Prior experience as a Blue Teamer, SOC analyst, or incident responder providing a well-rounded understanding of the defensive landscape
-Experience with Infrastructure as Code (IaC) for automated deployment of offensive infrastructure
-Familiarity with applying AI/ML techniques (e.g., deepfakes, prompt injection) in red team scenarios