Back to Signal
Zenith Beacon

Red Team Lead

PrincipalOffensive Security & AI Red TeamingRemoteBrisbane, QLD
$305k
Open to Right Opportunity

Quick Match Check

Company Size

Enterprise (1000+)

Company Type

TechFinancial ServicesGovernment

Key Skills

Cobalt StrikeMetasploit FrameworkC/C++ & Python for exploit developmentActive Directory/Azure AD exploitationCloud Security (AWS/Azure)Container Escape TechniquesReverse Engineering (IDA Pro/Ghidra)Kernel Exploitation

Roles Worked

Principal Penetration Tester
Red Team Lead
Senior Offensive Security Engineer

Industry Experience

TechFinancial ServicesDefence

CyberSec People will make the introduction

Skills Assessment

1st PrinciplesCode BiasTech DepthCuriosityWar Stories9.09.09.09.09.0
1st Principles9/10

Breaks down complex problems into fundamental truths and builds solutions from the ground up

Code Bias9/10

Prefers building and shipping code over meetings and documentation

Tech Depth9/10

Deep technical expertise across security domains, tools, and architectures

Curiosity9/10

Constantly learning, experimenting, and staying ahead of emerging threats

War Stories9/10

Battle-tested experience solving real-world security incidents and challenges

Profile Summary

This Principal Red Team Lead builds sophisticated attack simulations and advanced adversary emulation frameworks to proactively identify critical vulnerabilities in complex enterprise environments. They are instrumental in hardening defenses and elevating the security posture for high-profile Australian organisations, translating deep offensive insights into actionable defensive strategies.

Problems Solved

  • Orchestrated a red team engagement that uncovered critical zero-day vulnerabilities in a major Australian bank's core banking system, leading to a 40% reduction in attack surface exposure within 3 months.
  • Developed and deployed custom C2 infrastructure that evaded detection by advanced EDR/XDR solutions across a multi-cloud environment, demonstrating the need for enhanced behavioral analytics and improving detection rates by 35%.
  • Led a team that successfully compromised a simulated critical national infrastructure (CNI) target, providing actionable intelligence that informed a 50% uplift in their ICS/SCADA security protocols.

What They Build

They build bespoke offensive tools, advanced C2 frameworks, and realistic adversary emulation scenarios to test and break security controls. Their work directly informs the development of more resilient systems and robust detection capabilities, often involving novel exploitation techniques and stealthy persistence mechanisms.

What Would Make Them Move

Looking for a principal offensive security role where I can build a red team program from scratch or take an existing one to the next level. Want a company that values adversarial thinking, not just checkbox pentesting. Need to work with smart people.

Mission & Values

Offensive security is about empathy — understanding how attackers think so you can protect the people who cannot protect themselves. Every vulnerability I find is one a real adversary will not get to exploit first.

Growth Areas

Exploit DevelopmentCloud PentestingSecurity Research Publishing

Open to

Principal Offensive Security RoleSecurity LeadershipTechnical Architecture