Jobs
Interviews
1 Job openings at SAR iNFOTECH
Offensive Security specialist

Pune, Maharashtra, India

5 years

None Not disclosed

On-site

Full Time

Job Title: Offensive Security Specialist (Red Team) Department: Red Team Unit Location: Qatar Job Type: Full-Time | Onsite Only Reports To: Red Team Manager Position Overview: We are seeking a highly qualified Red Team Offensive Security Specialist to join the cybersecurity unit of a customer. This role demands exceptional technical acumen in cyber offense, deep familiarity with adversarial tactics, and a commitment to confidentiality, precision, and resilience. You will be part of a strategic capability performing adversary emulation and cyber-attack simulations. Key Responsibilities: 1. Red Team Operations & Attack Simulation Design and execute full-scope adversary emulation campaigns against internal systems, networks, and identified assets Simulate advanced persistent threats (APTs), insider threats, and targeted attack scenarios using TTPs derived from real-world intelligence Conduct physical and cyber infiltration testing of sensitive networks and secure zones (where authorized) 2. Threat Emulation and Nation-State Tactics Emulate the tactics, techniques, and procedures of known hostile foreign actors and cyber warfare units Integrate threat intelligence feeds to align Red Team exercises with evolving global threat landscapes Execute covert testing (assumed breach, initial access, lateral movement, and exfiltration) without disrupting services 3. Advanced Tooling and Exploitation Customize and develop zero-day exploitation chains, payloads, and implants Maintain and operate stealth C2 frameworks (e.g., Cobalt Strike, Sliver, Mythic, Empire) Bypass defense-in-depth controls such as SIEM, EDR, NDR, hardened OS environments, and advanced firewalls 4. Technical Reporting and Strategic Advisory Deliver detailed technical debriefs and executive-level threat simulation reports Collaborate with Blue Team, SOC, and CTI teams to test and tune detection rules and response playbooks Recommend enhancements to cyber defense posture based on operational findings 5. Confidentiality and Operational Discipline Work in a high-security, with strict operational protocols Handle classified data with absolute discretion and compliance to national laws Follow secure coding, storage, and usage procedures for Red Team tooling Preferred Skills and Experience: Minimum 5+ years in offensive security / Red Teaming, Expert knowledge in: Offensive Windows & Linux security Advanced network pivoting, traffic obfuscation, and lateral movement Active Directory abuse, Kerberos attacks, and credential theft Binary exploitation, shellcode development, AV/EDR evasion Fluency with frameworks such as MITRE ATT&CK, D3FEND, Cyber Kill Chain Strong scripting and tooling development skills (Python, PowerShell, Bash, Go, or C++) Experience operating in air-gapped and sensitive environments Preferred Qualifications: Bachelors Degree or equivalent Certifications: OSCP, OSEP, CRTO II, OSCE3, GPEN, GXPN, GCPN Prior experience in: Critical infrastructure (SCADA/ICS) Red Teaming will be an advantage OPSEC procedures and classified engagement protocols

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Job Titles Overview