Principal Red Team Engineer
Confidential
Posted: March 10, 2026
Interested in this position?
Create a free account to apply with AI-powered matching
Quick Summary
Defending the digital frontier is our mission. At Northwave, we combine ethical hacking expertise with behavioral psychology insights and cutting-edge security management at the highest level.
Required Skills
Job Description
About Northwave
Defending the digital frontier is our mission.
At Northwave, 275 cybersecurity specialists transform how organisations approach digital safety. From our HQ in Utrecht, along with offices in Germany, Sweden, and Belgium.
Northwave combines ethical hacking expertise with behavioral psychology insights and cutting-edge security management at the highest level. We respond to threats and anticipate them, providing 24/7 managed security services and tailored solutions for each client's journey.
By joining Northwave, you’ll become part of an organisation where innovation drives results, whether your talents lie in technical penetration testing or strategic client partnerships. Here, your expertise will grow and help shape the future of digital security across industries, leaving a lasting impact.
Our Red Team
Our Red Team lives for hacking. With challenging penetration tests and red team exercises, we ensure that our clients are optimally protected. We work closely with Northwave's Blue Team, Threat Intelligence, and CERT to make our clients more resilient. We are proud of our role as a TIBER and ART provider and our impact in the Benelux, DACH region, and Nordics.
The Role
As a seasoned Red Team Operator, you will work on clever attack scenarios to test and strengthen our clients. You will train Blue Teams during Purple Teaming workshops and present results to all levels of the organization, from technicians to CEOs. Thanks to our diverse expertise, you will have the opportunity to discover new vulnerabilities and share unique tactics on (inter)national platforms.
How we achieve this
Everything starts with an intake: what are the crown jewels? Together, we develop realistic attack scenarios and document agreements in a Rules of Engagement document. Then we immediately get to work with techniques such as OSINT, malware building, spear phishing, and exploiting vulnerabilities.