Red Team Instructor
Location:
South East Asia, The Gulf and the Caucasus area (Relocation Required)
Salary:
Competitive package, salary above market rates, accommodation and travel covered
Contract Type:
South East Asia, The Gulf and the Caucasus area (Relocation Required)
Red Team Instructor
Offensive Security (Red Team & CTF) Instructor
We are looking for a passionate and technically skilled Red Team, CTF & Reverse Engineering Instructor to join an elite cyber academy. This is a unique opportunity to train the next generation of cybersecurity professionals. In this role, you will lead hands-on Offensive Security, Red Team & CTF training, develop reverse engineering content, and guide students through the skills needed to tackle real-world binary exploitation and malware analysis challenges.
Package:
1) Competitive base salary (DOE)
2) Full coverage of travel expenses
3) Fully furnished accommodation with an office (relocation is required for this role)
4) No income tax (due to the nature of the location)
5) Full medical cover
In this position, you will:
Join a team of instructors, responsible for our cybersecurity programs.
Conduct frontal teaching of information security and cyber courses.
Use Innovative technologies.
Develop and teach advanced labs.
Development of pedagogic materials and labs.
Company Overview
Our client delivers tailored cyber training and specialised products supported by modern technology and deep operational experience. Their programmes include realistic simulation environments, practical lab-based learning, and fully customised training paths that reflect the latest industry needs and emerging threats.
Their work supports government, defence, and commercial organisations, enabling teams to develop real-world capability in secure, controlled and immersive settings. They continue to invest heavily in research and development to ensure their solutions remain relevant, effective, and future-focused.
• Design and deliver comprehensive Red Team training covering offensive security tactics, techniques, and procedures (TTPs), ensuring students can conduct thorough adversary simulations.
• Develop, update, and maintain advanced curriculum in penetration testing, vulnerability exploitation, and post-exploitation techniques using the latest cybersecurity tools and frameworks.
• Lead practical exercises and labs on the use of key offensive security tools such as Metasploit, Cobalt Strike, Nmap, Burp Suite, Empire, and BloodHound.
• Teach students to conduct network reconnaissance, enumeration, and vulnerability scanning using tools like Nmap, Nessus, and OpenVAS.
• Guide students in exploiting vulnerabilities, leveraging tools such as SQLMap, ExploitDB, and custom scripts for real-world attack simulations.
• Deliver advanced post-exploitation training (lateral movement, privilege escalation) and persistence techniques using tools like Mimikatz, PowerShell Empire, and Covenant.
• Provide expertise in Active Directory exploitation, including Kerberoasting, Pass-the-Hash, and Golden/Silver Ticket attacks.
• Introduce students to social engineering tactics, phishing simulations, and physical penetration testing techniques.
• Instruct on privilege escalation in both Linux and Windows environments using tools such as WinPEAS, LinEnum, and GTFObins.
• Conduct cloud penetration testing on AWS, Azure, and Google Cloud platforms, teaching students how to identify and exploit misconfigurations.
• Teach advanced web application security testing using tools like Burp Suite, covering OWASP Top 10 vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), and Server-Side Request Forgery (SSRF).
• -Organize and lead Capture-the-Flag (CTF) challenges and other cybersecurity competitions.
• Conduct red vs. blue team exercises, helping students understand both offensive and defensive perspectives in cyber operations.
• Mentor and provide one-on-one coaching to students, helping them improve their technical skills and preparing them for real-world scenarios.
Technical Skills:
• Expert-level knowledge of offensive security tools and frameworks:
Metasploit, Cobalt Strike, Empire, BloodHound, PowerShell Empire, Nmap, Wireshark, Burp Suite, SQLMap, John the Ripper, Hashcat, Impacket, and Responder.
• Proficient in network penetration testing including network scanning, vulnerability assessments, and exploitation.
• Strong understanding of web application security and experience exploiting OWASP Top 10 vulnerabilities.
• Knowledge of Active Directory attack techniques, including Kerberoasting, Pass-the-Hash, and privilege escalation.
• Cloud penetration testing experience in environments such as AWS, Azure, and Google Cloud, including common misconfigurations and attack surfaces.
• Social engineering techniques, including phishing and physical penetration strategies.
• Hands-on experience with exploiting misconfigurations, bypassing security controls, and developing custom scripts for penetration testing.
• Ability to teach wireless network exploitation techniques such as WPA cracking, Rogue AP, and Man-in-the-Middle (MITM) attacks.
• Familiarity with Red Team/Blue Team exercises, understanding threat hunting, incident response, and log analysis to simulate real-world attack/defense scenarios.
• Proficiency with scripting languages like Python, PowerShell, and Bash for automation of attack vectors and tool development.
Requirements:
• Proven experience in Red Team operations, penetration testing, or offensive security roles.
• Relevant certifications (e.g., OSCP, OSCE, CEH, CISSP, CRTO, etc.) are highly desirable.
• Strong communication skills with the ability to explain complex concepts to both technical and non-technical audiences.
• Willingness to relocate to one of our cyber academies for the position.
Preferred Qualifications:
• Prior experience in an instructional role in cybersecurity or offensive security.
• Familiarity with cyber range platforms and simulated attack environments.
• Military training experience or working in high-stakes environments is a plus.

