Red Team Member (Tooling & Adversary Research)

Dark Wolf SolutionsColorado Springs, CO
Hybrid

About The Position

Dark Wolf is seeking a Red Teamer for our pack. As a Red Team professional, you will assist in the architecture for the offensive capabilities used in high-stakes security assessments. Unlike a standard operator role, this position focuses heavily on the pre-operational phase: developing custom tooling, weaponizing exploits, and engineering infrastructure that mirrors the sophistication of modern Advanced Persistent Threats (APTs). You will bridge the gap between adversary research and operational execution, ensuring the team has the technical edge to bypass state-of-the-art defenses.

Requirements

  • Active Top Secret Security clearance.
  • Understanding of the MITRE ATT&CK® framework and the ability to emulate the full lifecycle of an APT.
  • Competent in low-level languages (C/C++, Rust, or Go) and scripting languages (Python, PowerShell, or C#) for tool development and memory injection techniques.
  • Experience taking proof-of-concept (PoC) code and refining it into stable, operationally ready exploits.
  • Deep understanding of Windows Internals (PE format, API hooking, process hollowing) and/or Linux/Cloud architecture (AWS, Azure, GCP) from an offensive perspective.
  • Proven track record of bypassing modern security stacks, including advanced Endpoint Detection and Response (EDR) and Next-Gen Firewalls.

Nice To Haves

  • Technical designations such as OSEP (Offensive Security Experienced Penetration Tester), CRTO (Certified Red Team Operator), CRTL (Certified Red Team Leader) or GXPN (Giac Exploit Researcher and Advanced Penetration Tester).
  • Experience with CI/CD pipelines and infrastructure-as-code (Terraform, Ansible) to rapidly deploy and tear down operational environments.

Responsibilities

  • Research, develop, and maintain custom offensive toolsets, including C2 frameworks, initial access payloads, and post-exploitation modules.
  • Translate intelligence on real-world adversary behaviors into actionable playbooks and automated tradecraft.
  • Architect and deploy resilient, obfuscated redirector networks and command-and-control (C2) infrastructure that evades EDR/XDR and NDR solutions.
  • Conduct deep-dive analysis into modern defensive technologies (AMSI, ETW, Kernel-level monitoring) to develop novel bypass techniques.
  • Support active operations by providing real-time troubleshooting for custom tools and adapting payloads mid-engagement to overcome specific defensive hurdles.
  • Mentor Red Team operators on the technical nuances of advanced tactics and ensure the "how" and "why" of adversary techniques are understood across the security organization.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Senior

Education Level

No Education Listed

Number of Employees

101-250 employees

© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service