Responsibilities Conduct penetration tests across Web applications, APIs, Mobile applications, infrastructure, cloud environments, and devices. Conduct red team engagements across complex environments (including operational technologies). Drive all phases of penetration tests and red team engagements, including Scoping, planning, communications, timelines, and execution of key activities (reconnaissance, vulnerability identification, exploitation, and reporting). Develop in-depth reports (issue, severity, impact, remediation recommendations) for penetration tests and red team engagements. Develop tools and techniques to automate, scale, and accelerate adversary emulation capabilities and vulnerability discovery. Develop exploits and POCs to evade defensive countermeasures and emulate threat actor TTPs. Establish and mature team documentation, processes, procedures, and team KPIs. Mentor penetration testers, red team members, and other functions where needed to drive unified and holistic outcomes. Manage third-party pen test and red team engagements to ensure high-quality products and deliverables. Support offensive security research, innovation, and testing across emerging capabilities (e.g. AI, LLM, ML, NLP, Smart Contracts, etc.). computer science/engineering or related cyber field, and 2 years of relevant experience. Mandatory Technical Skills Advanced knowledge of security tools (Burp Suite, Metasploit, Cobalt Strike, Empire, Nmap, bloodhound, etc.) and multiple operating systems (e.g. Windows, Linux). Proficient in at least one scripting language (Python, bash, PowerShell) or one programming language (Java, C#, C++). Experience in multiple security domains (e.g. Network security, Application Security, Infrastructure Security, Cloud Security, Security operations). Experience in aligning threat and vulnerability management efforts to frameworks and control objectives - MITRE ATT&CK, NIST CSF, ISO27001, CIS, OWASP. Familiarity with defensive and monitoring technologies such as Intrusion prevention/detection systems (IPS/IDS), Web application firewalls (WAF), security information and event management systems (SIEMs), and endpoint detection/response (EDR) tools, as well as user and entity behavior analytics (UEBA). Experience in developing offensive security tooling and automation is a plus. Non-technical Skills A proactive and positive team player who is impact-focused, driven, curious, analytical, and a self-starter. Demonstrated ability to autonomously make high-judgment decisions and take calculated risks. Ability to establish trust relationships and influence others to positively impact the security posture and the business. Flexible and adaptive to support a dynamic and global environment with diverse stakeholders and ambiguity. Solid customer orientation with excellent oral and written communication skills in English. Must be able to operate extremely well under pressure.