Cyber Security Red Team
Randstad India
2 - 5 years
Hyderabad
Posted: 12/02/2026
Job Description
Location: Hyderabad/ Bangalore
Required skills:
- At least 8+ years of experience in penetration testing and red team operations.
- Deep understanding of Transmission Control Protocol / Internet Protocol (TCP/IP) protocols, devices, security mechanisms and how they operate.
- Strong understanding of network security threats including APT, botnets, Distributed Denial of Service (DDoS) attacks, worms, and network exploits.
- Adversary Emulation: Design and execute end-to-end red team engagements, mimicking the TTPs of specific threat actors relevant to our industry.
- Full-Kill Chain Execution: Lead all phases of an engagement: Reconnaissance (OSINT), Initial Access (Phishing, Social Engineering), Persistence, Lateral Movement, and Objective Achievement (Data Exfiltration).
- Stealth Operations: Conduct operations while avoiding detection by EDR, SIEM, and SOC analysts. Develop custom payloads and bypass techniques for modern security controls.
- Infrastructure Management: Build and maintain covert "attack infrastructure," including C2 (Command & Control) servers, redirectors, and domain fronting.
- Collaborative Debriefs: Participate in "Purple Team" exercises. Instead of just throwing a report over the fence, work alongside the Blue Team to help them build better detection signatures.
- Tool Development: Write custom scripts and tools (in Python, Go, or PowerShell) to automate repetitive tasks or exploit unique vulnerabilities where off-the-shelf tools fail.
- Reporting: Translate complex technical findings into actionable executive summaries that highlight business risk, not just technical flaws.
- Excellent written and verbal communication skills and have demonstrated ability to present material to senior officials.
- Highly self-motivated requiring little direction.
- Demonstrates creative/out-of-the-box thinking and good problem-solving skills.
- Sense of urgency and attention to detail
- Flexible to provide coverage in US morning hours on a need-basis, and as required
Desirable skills:
Strong knowledge of an enterprise architecture
Ability to obtain a strong and ongoing understanding of the technical details involved in current APT threats and exploits involving various operating systems, applications and networking protocols.
Knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups and both state and non-state sponsored threat actors.
Understanding of cloud-based architectures and highly distributed big data architectures
Experience with application security testing tools, such as the Metasploit framework and Burp Suite
One or more of these certifications
o CEH: Certified Ethical Hacker
o CPT: Certified Penetration Tester
o CEPT: Certified Expert Penetration Tester
o GPEN: GIAC Certified Penetration Tester
o OSCP: Offensive Security Certified Professional
Services you might be interested in
Improve Your Resume Today
Boost your chances with professional resume services!
Get expert-reviewed, ATS-optimized resumes tailored for your experience level. Start your journey now.
