Full-Time

Lead Red Team Specialist

Posted on 8/18/2025

Deadline 10/24/25
Marsh & McLennan

Marsh & McLennan

Compensation Overview

$140k - $280k/yr

+ Performance-based incentives

Company Does Not Provide H1B Sponsorship

Houston, TX, USA + 3 more

More locations: Grimes, IA, USA | Phoenix, AZ, USA | Denver, CO, USA

Hybrid

All Marsh McLennan colleagues are expected to be in their local office or working onsite with clients at least three days per week.

Category
IT & Security (1)
Requirements
  • Undergraduate degree in Computer Science, Information Systems, or related field, or equivalent experience.
  • 8+ years of experience in red team assessments, offensive cyber operations, or penetration testing.
  • Strong critical thinking, analytical skills, and the ability to learn and adapt quickly.
  • Proven experience working with security operations, incident response, or detection engineering teams.
  • Deep knowledge of attack techniques, threat actors, and current industry trends.
  • Proficiency in coding, scripting, and building/red team infrastructure.
  • Ability to operate independently in a fast-paced, evolving environment.
Responsibilities
  • Design and execute advanced adversary emulation operations tailored to industry verticals, geolocations, and emerging threats.
  • Conduct Red/Purple team assessments, identify security gaps, and recommend effective remediation strategies.
  • Develop proof-of-concept tools, tactics, techniques, and procedures based on threat actor research.
  • Build, maintain, and secure scalable test infrastructure to support operational objectives.
  • Document operational activities clearly and communicate findings effectively to technical and non-technical audiences, including supporting complex incident investigations.
Desired Qualifications
  • Industry certifications such as OSCP, OSCE, OSWE, GPEN, GCIH, GWAPT, or GXPN.
  • Experience with large-scale IT implementations and operations.
  • Expertise in domains like network architecture, operating systems, cloud computing, web application testing, or social engineering.
  • Demonstrated ability to replicate threat actor tactics and develop innovative operational tools.

Company Size

N/A

Company Stage

N/A

Total Funding

N/A

Headquarters

N/A

Founded

N/A

INACTIVE