Job Search and Career Advice Platform

¡Activa las notificaciones laborales por email!

Attack & Penetration - Red Team Consultant Contract to Hire in CDMX

Near Shore Cyber

Ciudad de México

Presencial

MXN 400,000 - 600,000

A tiempo parcial

Hace 23 días

Genera un currículum adaptado en cuestión de minutos

Consigue la entrevista y gana más. Más información

Descripción de la vacante

A cybersecurity firm in Mexico City seeks a Red Team Consultant for a 1-month contract, potentially extending up to 12 months. The role involves leading advanced offensive security engagements to assess organizational cyber defenses via realistic simulations. Candidates must be Mexican nationals with proven experience in Red Team operations, expertise in offensive security tools, and strong analytical skills to provide actionable insights. The daily rate offered is USD $300, with an on-site schedule from Monday to Friday.

Formación

  • Mexican citizenship is mandatory.
  • Proven experience executing complex Red Team or advanced penetration testing engagements.
  • Strong analytical skills with the capability to translate technical impact into business-aligned recommendations.

Responsabilidades

  • Plan and execute end-to-end Red Team operations targeting infrastructure.
  • Conduct vulnerability assessments and penetration tests.
  • Deliver timely, clear, actionable reporting for stakeholders.

Conocimientos

Red Team operations
Threat intelligence
Pentesting
Offensive security
Metasploit
Cobalt Strike
Python

Educación

Relevant certifications (OSCP, OSCE, OSEP, CEH)

Herramientas

PowerShell
Bash
Descripción del empleo
Attack & Penetration – Red Team Consultant
Location:
Centro Histórico, Mexico City, CDMX
Employment Type:
1-Month Contract (Extensions up to 12 Months Possible)
Schedule:
On-Site | Monday–Friday | 8:00 AM–5:00 PM
Start Date:
Monday, December 1, 2025
Daily Rate:
USD $300
Eligibility:
Mexican nationals only
Overview

We are seeking a Red Team Consultant to lead a full-scope offensive security engagement for a major enterprise client. The mission: assess and challenge the organization's cybersecurity posture through realistic adversary simulations, infrastructure exploitation, detection‑evasion testing, and targeted scenario execution.

You will operate in both independent and collaborative modes, supporting red team, purple team, and full-spectrum offensive assessments. This includes network, application, wireless, physical access, and social engineering operations. The environment is fast‑paced, hands‑on, and outcome‑driven—ideal for an operator who can think creatively, execute precisely, and communicate clearly.

Core Assessment Activities
Reconnaissance
  • Intelligence-driven threat mapping and target development.
Scenario Design
  • Construction of realistic attack paths aligned to client environment and threat profile.
Execution
  • Lateral movement, privilege escalation, and data exfiltration.
  • Web application exploitation, command‑and‑control deployment, ransomware simulation, and web shell operations.
Compliance & Objectives
  • Achieve defined success indicators (“flags”) and document evidence.
Success Indicators ("Flags")
  • Extract or alter data from critical internal services.
  • Start, stop, or manipulate mission‑critical Windows/Linux services.
  • Inject unauthorized transactions or commands between critical systems.
  • Compromise virtualization or hypervisor infrastructure.
Key Responsibilities
  • Plan and execute end-to-end Red Team operations targeting internal network, infrastructure, and application layers.
  • Conduct purple team exercises, vulnerability assessments, penetration tests, wireless security reviews, physical security evaluations, and social engineering engagements.
  • Execute full offensive workflow: reconnaissance, intel collection, scenario development, exploitation, and post‑exploitation.
  • Evaluate and challenge the client’s detection and response capabilities through stealth attack simulations.
  • Produce timely, high-impact deliverables, including:
    • Daily touchpoints: 10–15 minutes reviewing activities and next steps.
    • Weekly progress reviews: 30–60 minutes summarizing results, blockers, and escalations.
  • Deliver clear, actionable written and verbal reporting for both technical and executive stakeholders.
Requirements
  • Mexican citizenship is mandatory.
  • Proven experience executing complex Red Team or advanced penetration testing engagements.
  • Deep understanding of adversarial tactics, techniques, and procedures; expertise with offensive tooling such as Metasploit, Cobalt Strike, PowerShell, Python, Bash, and social engineering methodologies.
  • Demonstrated ability to work systematically, document findings clearly, and manage tight timelines.
  • Strong analytical skills with the capability to translate technical impact into business‑aligned recommendations.
  • Relevant certifications (OSCP, OSCE, OSEP, CEH, etc.) are strong advantages.
Consigue la evaluación confidencial y gratuita de tu currículum.
o arrastra un archivo en formato PDF, DOC, DOCX, ODT o PAGES de hasta 5 MB.