Red Team Services Consultant (remote, Sgp)

CrowdStrike CrowdStrike · Enterprise · Singapore · Remote

CrowdStrike is seeking a Red Team Services Consultant in the JAPAC region to conduct offensive security engagements, focusing on identifying actionable findings and improving client defenses. The role involves leading penetration tests and adversary emulation exercises, developing reports, contributing to tool development, and collaborating with internal teams. Candidates should have advanced offensive security skills, experience with Active Directory and cloud environments, and proficiency in tool development and automation. Experience using AI tooling for work acceleration is a strong advantage.

What you'd actually do

  1. Execute and lead Red Team and penetration testing engagements across a range of scopes and environments, with a focus on findings that clients can act on.
  2. Work as both an operator and engagement manager: coordinating with clients, directing team members, and keeping stakeholders well-informed throughout the engagement.
  3. Develop high-quality reports that document attack paths, findings, and pragmatic remediation recommendations, written for both technical teams and senior leadership.
  4. Contribute to the team's capability through tool development, research, and methodology improvements.
  5. Collaborate across CrowdStrike Services functions, working alongside our own "Blue" teams to help translate offensive findings into concrete defensive improvements.

Skills

Required

  • Red Team and penetration testing engagements
  • planning and driving assessments from end to end
  • common offensive tooling, including C2 frameworks
  • OPSEC considerations
  • detection avoidance
  • Active Directory environments: privilege escalation, lateral movement, persistence, and credential abuse
  • Windows, Linux, or macOS attacks
  • AWS and Azure environments: identity and access, compute, storage, and network attack paths
  • cloud misconfigurations
  • developing offensive tooling or automating assessment tasks
  • writing code
  • English written and verbal communication

Nice to have

  • AI tooling to sharpen and accelerate work (code generation, research, automation, documentation)
  • Additional language proficiency (Mandarin, Japanese, Hindi, or Thai)
  • Security community participation (conference talks, CVEs, published research, tool releases, blogging)
  • Advanced experience attacking networking components: routers, switches, firewalls, and wireless infrastructure
  • Hardware, embedded systems, physical security assessments, or OT/ICS environments

What the JD emphasized

  • focus on findings that clients can act on
  • pragmatic remediation recommendations
  • tool development
  • methodology improvements
  • translate offensive findings into concrete defensive improvements
  • Advanced proficiency with common offensive tooling
  • solid understanding of why the tools work, not just how to run them
  • Strong tradecraft
  • detection avoidance
  • adapt TTPs to the target environment
  • Advanced experience attacking Active Directory environments
  • privilege escalation, lateral movement, persistence, and credential abuse
  • Extensive knowledge of attacks against at least one of Windows, Linux, or macOS
  • Experience attacking AWS and Azure environments
  • how cloud misconfigurations chain together into exploitable scenarios
  • Experience developing offensive tooling or automating assessment tasks
  • building new capabilities or extending existing frameworks
  • writing code that makes the team faster and more effective
  • Experience using AI tooling to sharpen and accelerate work
  • Strong written and verbal communication
  • write a report finding that prompts a CISO to act and brief an engineer on an attack path
  • working effectively across that range is a real part of the job