Principal Red Team Operator

VerizonIrving, TX
$120,500 - $231,000Hybrid

About The Position

The Verizon Cyber Security (VCS) organization enables the business by protecting assets and information across Verizon networks, infrastructure and applications. VCS integrates cybersecurity governance, policies, technologies and operations across Verizon, and works to incorporate security into the design of technology systems and services. Verizon Cyber Security (VCS) is looking for a Red Team Operator for our Enterprise Red Team. In this role, you will lead the creation and execution of red team campaigns and penetration tests designed to evaluate and enhance our personnel, procedures, and technology. You will conduct objective-oriented campaigns across diverse Verizon targets, identifying vulnerabilities in systems, applications, and processes to build effective, real-world attack strategies. The ideal candidate will have the ability to emulate adversarial thinking, and possess a deep understanding of operating system security, networking protocols, firewalls, databases and middleware applications, forensics, scripting and programming, and phishing techniques. Additionally, the candidate will have the ability to communicate highly technical information to internal customers to align with VCS and broader Verizon objectives.

Requirements

  • Bachelor's degree or four or more years of experience.
  • Six or more years of relevant required, demonstrated through one or a combination of job-related work experience, military experience, or specialized training or education (non-collegiate).
  • Six or more years of direct offensive security experience, specifically leading engagements in Adversary Emulation, Adversary Simulation, Threat Emulation or Threat Simulation.

Nice To Haves

  • Proven ability to modify TTPs to evade modern EDR/NDR/XDR solutions and bypass security controls like AMSI and ETW.
  • Deep knowledge of Operating System internals (Windows, Linux, macOS) including memory management, process injection, API hooking, and kernel-level structures.
  • Thorough understanding of network protocols, with the ability to design covert command-and-control channels that blend with legitimate traffic.
  • Expertise in Active Directory and Azure AD attacks, including advanced techniques like Kerberoasting, DCSync, Golden Ticket, and identity federation exploits.
  • Implementation-level familiarity with modern exploitation, including buffer overflows, heap spraying, ROP chains, and logic flaws.
  • Advanced proficiency in reading and modifying code in languages such as C#, C/C++, Go, or Java for the purpose of exploit development and custom tooling.
  • Solid understanding of cloud-native environments, specifically containerization platforms (Docker, Kubernetes) and major cloud infrastructure (AWS, Azure, GCP).
  • Advanced industry certifications such as OSEP, OSED, GXPN, CRTO, or OSCP/OSWE.
  • A track record of continuous evolution, demonstrated by participation in CTFs, contributions to open-source security tools, or speaking at industry conferences.
  • Fluency in Blue Team processes and technologies (SIEM logic, threat hunting, SOC triage) to better simulate realistic threats and provide actionable feedback.
  • Demonstrated proficiency in scripting and automation (Python, Bash, PowerShell) to develop custom offensive security tooling and bypass security controls.
  • A degree in a technical field.

Responsibilities

  • Leading and executing end-to-end Red Team assessments, including adversary/threat simulation and emulation, social-engineering testing, and cybersecurity control bypass techniques.
  • Developing adversary emulation plans that align with MITRE ATT&CK by incorporating cyber threat intelligence.
  • Configuring and safely utilizing attacker tools, tactics, and procedures for Verizon environments
  • Developing presentations and reports that effectively communicate to both technical and executive audiences.
  • Assisting offensive security assessment operations in support of Red, Blue, and Purple Teams.
  • Planning and executing comprehensive penetration testing exercises, including vulnerability scanning, network reconnaissance, and exploitation of identified weaknesses.
  • Continuously enhancing the organization's security posture by sharing knowledge and expertise with other security team members.
  • Effectively communicating findings and strategies to client stakeholders, including technical staff, executive leadership, and legal counsel.
  • Providing risk-appropriate and pragmatic recommendations to correct found vulnerabilities.
  • Developing scripts, tools, or methodologies to enhance Verizon’s red teaming and penetration testing processes and tradecraft.
  • Providing leadership and guidance to advance the offensive capabilities of the team and its subsequent ability to defend the Verizon Enterprise.

Benefits

  • medical
  • dental
  • vision
  • short and long term disability
  • basic life insurance
  • supplemental life insurance
  • AD&D insurance
  • identity theft protection
  • pet insurance
  • group home & auto insurance
  • matched 401(k) savings plan
  • company paid holidays
  • personal days
  • paid parental leave
  • adoption assistance
  • tuition assistance
  • overtime
  • shift differential
  • holiday pay
  • allowances
  • vacation
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service