Search by job, company or skills

tandem search

Red Team Specialist

Save
new job description bg glownew job description bg glow
  • Posted 4 months ago
  • Be among the first 10 applicants
Early Applicant

Job Description

A well established and fast growing IT company is seeking a Red Team Specialist to join its dynamic team in Dubai, UAE. This is a full time, on site role for someone passionate about offensive security, adversary emulation, and continuously challenging modern enterprise defenses.

Job Summary

As a Red Team Specialist, you will run adversary emulation engagements end to end and feed actionable detection intelligence back to the Blue Team. When operational tempo is low, you will transition into full stack penetration testing to ensure continuous value delivery and zero bench time.

Key Responsibilities

  • Adversary operations: Plan and execute end to end simulated attack campaigns to validate security posture and meet testing objectives, with strong OPSEC and infrastructure lifecycle management.
  • C2 & payload engineering: Design, build, and maintain command and control frameworks and payloads, considering modern cloud and identity centric environments.
  • Replayable TTPs: Convert attack scenarios into reusable modules for defender validation, including documentation of expected telemetry and signals.
  • Exploit development & R&D: Research vulnerabilities and develop proof-of-concept exploits aligned with assessment goals, prioritizing responsible weaponization.
  • Purple team collaboration: Conduct post engagement debriefs with defensive teams to highlight missed detections, reduce dwell time, and improve monitoring and detection rules.

Job Requirements

  • Minimum 5 years of hands on experience in offensive security or red teaming
  • Proven EDR/XDR evasion tradecraft (userland, kernel callbacks, signed driver abuse)
  • C2 operations & traffic shaping (HTTPS, DNS over HTTPS, redirectors)
  • Phishing & initial access infrastructure (GoPhish, custom HTML, Office macros)
  • Strong knowledge of Windows internals and attack paths (LSASS abuse, AMSI bypass, AD CS misconfigurations)
  • Cloud post exploitation experience (STS token pivots, Azure automation accounts, GCP IAM)
  • Scripting or exploit development skills in C/C++, C#, Python, or Rust
  • Strong evidence handling and reporting discipline, including reproducible steps, IOC timelines, and executive level summaries
  • Relevant certifications such as CREST CRT, OSCE3, or CRTO II are a strong advantage.

If you are passionate about offensive security, adversary simulation, and working on challenging, high impact projects in a fast growing IT company, we encourage you to apply!

More Info

Job Type:
Industry:
Function:
Employment Type:

About Company

Job ID: 136999659