Back to Signal
Zenith BeaconVouched 1 time by industry insiders

Red Team Lead

PrincipalOffensive SecurityRemoteBrisbane, QLD
$305k
Open to Right Opportunity

Quick Match Check

Company Size

Enterprise (1000+)

Company Type

TechFinancial ServicesGovernment

Key Skills

Cobalt StrikeMetasploit FrameworkC/C++ & Python for exploit developmentActive Directory/Azure AD exploitationCloud Security (AWS/Azure)Container Escape TechniquesReverse Engineering (IDA Pro/Ghidra)Kernel Exploitation

Ricki from CyberSec People will make the introduction

Skills Assessment

1st PrinciplesCode BiasTech DepthCuriosityWar Stories9.09.09.09.09.0
1st Principles9/10

Breaks down complex problems into fundamental truths and builds solutions from the ground up

Code Bias9/10

Prefers building and shipping code over meetings and documentation

Tech Depth9/10

Deep technical expertise across security domains, tools, and architectures

Curiosity9/10

Constantly learning, experimenting, and staying ahead of emerging threats

War Stories9/10

Battle-tested experience solving real-world security incidents and challenges

Profile Summary

This Principal Red Team Lead builds sophisticated attack simulations and advanced adversary emulation frameworks to proactively identify critical vulnerabilities in complex enterprise environments. They are instrumental in hardening defenses and elevating the security posture for high-profile Australian organisations, translating deep offensive insights into actionable defensive strategies.

Problems Solved

  • Orchestrated a red team engagement that uncovered critical zero-day vulnerabilities in a major Australian bank's core banking system, leading to a 40% reduction in attack surface exposure within 3 months.
  • Developed and deployed custom C2 infrastructure that evaded detection by advanced EDR/XDR solutions across a multi-cloud environment, demonstrating the need for enhanced behavioral analytics and improving detection rates by 35%.
  • Led a team that successfully compromised a simulated critical national infrastructure (CNI) target, providing actionable intelligence that informed a 50% uplift in their ICS/SCADA security protocols.

What They Build

They build bespoke offensive tools, advanced C2 frameworks, and realistic adversary emulation scenarios to test and break security controls. Their work directly informs the development of more resilient systems and robust detection capabilities, often involving novel exploitation techniques and stealthy persistence mechanisms.

Mission & Values

Committed to advancing cybersecurity and building more secure systems. Passionate about mentoring and sharing knowledge with the broader community.

Areas of Growth

LeadershipStrategic ThinkingTeam Building

Open to

Principal Offensive Security RoleSecurity LeadershipTechnical Architecture