XINTRA Logo

All positions

Red Team Lead – Adversarial Simulation

REMOTE - Australia OR European Union

Full-time

$130k - $160k AUD or €75k- €95k Euros

About Us

XINTRA is a cybersecurity company offering advanced labs and training for mid to large enterprises. We are a tight team that work remotely and have a strong emphasis on work life balance. You will be joining a very ambitious team where your opinions will be valued and you will be able to make an impact on the direction of where the company is going.

We are looking for a red teamer who:

  • Values independence and takes pride in their work

  • Wants to do research with NO consulting / reporting

  • Want to work around ambitious, intelligent people who challenge them

  • Enjoy solving problems and coming up with new solutions

  • Not afraid to take a risk, try new things, fail and bounce back

  • Have a desire to innovate and contribute to the industry

We are not looking for people who:

  • Enjoy being told what to do step-by-step

  • Don’t think outside the box

We are looking for a full time Red Team Lead who will be performing adversary simulations on various different APT/Commodity groups for our labs.

The Role

As a Red Team Lead, you’ll be building and delivering our lab emulations. You’ll be tasked with various different APT/Commodity groups to emulate and you will work in a team (with incident responders, developers and infrastructure engineers) to make sure the emulation is as close to possible. This role assumes you have had previous experience red teaming (working on active engagements) and have the skills to custom code malware and tools where needed.

Key Responsibilities

  • Adversary Emulation – Research and simulate APT-style attacks from end-to-end (meaning reconnaissance all the way through to exfiltration) across network devices, and various OS’s. These emulations will be performed in a different mock environment each time.

  • Covert Operations – Execute stealthy emulations with evasion techniques to bypass modern detection tools (we will not disable AV, EDR). 

  • Malware Development – Have the ability to custom code malware to emulate existing malware / tools used by APT/Commodity groups in ops

  • Custom Exploit Development – Develop payloads, utilise existing C2 frameworks, and write / build exploits to test defenses.

  • Internal Tools Development – Work with our existing team to automate and develop internal red team frameworks to leverage on emulations. 

  • Collaboration – Work alongside incident responders, threat intel people and infrastructure people to refine the emulation labs 

  • Timelining Activity – Document findings in an attacker timeline and write attack briefs. There is no reporting needed.

What We’re Looking For

  • Proven skills in red team ops and adversarial emulation

  • Proven skillset in building offensive tools, custom coding malware or writing exploits

  • We do not care if you have no certs. We want people with skills who have a passion for this.

How to apply

If you’re excited about this opportunity and meet most of the qualifications, we’d love to hear from you! Apply now by sending your resume to [email protected].