Manager, Red Team Services (remote, Gbr)

CrowdStrike CrowdStrike · Enterprise · Spain, United Kingdom · Remote

This role is for a Manager of Red Team Services at CrowdStrike, a cybersecurity company. The role involves leading a team to simulate threat actors, perform penetration testing, and improve customer security defenses. It requires technical leadership, active participation in assessments, and communication with various stakeholders. The role also involves developing and maintaining Red Team offerings, coordinating activities, and reporting on results. Experience with regulatory red team engagements and managing a tool development lifecycle is desirable. The role is not directly involved in building AI/ML models but operates within a company that uses an AI-native platform.

What you'd actually do

  1. Lead the design, implementation, and delivery of Red Team offerings, including engagement work, reporting, and metrics.
  2. Overseeing the day-to-day operations of the Red Team.
  3. Act as a primary contact for coordination of Red Team activities as well as coordinating and leading all penetration testing activities.
  4. Responsible for developing and maintaining strong relationships with 3rd party vendors supporting Red Team engagements.
  5. Develop reporting including mitigations strategies of results of Red Team activities for both management and technical audiences.

Skills

Required

  • Advanced experience with Security Assessment Toolsets (Cobalt Strike, other open source and commercial C2 frameworks, Burp Suite, etc.)
  • Comprehensive understanding of the security methodologies, technologies, and best practices
  • Windows / Linux / UNIX / Mac operating systems experience
  • Advanced experience with Networking components (routers, switches, load balancers, wireless access points, etc.)
  • Comprehensive knowledge of firewalls, proxies, mail servers and web servers
  • Advanced experience with operational support for operating systems, applications and networks
  • Advanced experience with vulnerability/penetration testing/adversary emulation assessments
  • Advanced experience in automation and scripting of applications and systems

Nice to have

  • Experience delivering regulatory red team engagements (aligned with TIBER, DORA, CBEST, etc)
  • Experience with managing a tool development life cycle and development team
  • Security community participation (conference speaker, tool development contributor, prior experience delivering training and or contributions to broader security sphere)
  • Desirable Certifications, any of the following: CCRTM/CCSAM, CCRTS, OSEP, GPEN, OSCE, GCIH, GXPN, CRTO, CRTL

What the JD emphasized

  • Minimum 5 years of experience in a Red Team/Penetration Testing activities is highly preferred
  • Minimum 3 years of experience in a Leadership role is highly preferred
  • Experience delivering regulatory red team engagements (aligned with TIBER, DORA, CBEST, etc) is desirable
  • Experience with managing a tool development life cycle and development team