What if your red teaming skills could help secure critical infrastructure — and shape how an entire organization thinks about security?
Security isn't just compliance—it's resilience. Our client is shifting the narrative: security isn’t an isolated department, it’s embedded in every decision and process. we’re shifting the narrative: security isn’t an isolated department, it’s embedded in every decision and process. As our Offensive Cybersecurity Engineer, you'll help organizations uncover their vulnerabilities, enabling smarter defenses for critical systems across cloud environments. Your work won't just secure technology—it'll make real-world impacts by strengthening society’s digital infrastructure.
What you’ll do
Conduct advanced penetration tests and red teaming assignments across cloud platforms (Azure, AWS, GCP), web applications, APIs, and mobile environments.
Leverage tools like Burp Suite, Metasploit, Nmap, BloodHound, Cobalt Strike, and custom scripts to simulate realistic attack scenarios.
Develop your own scripts and tools to automate or deepen security assessments.
Clearly communicate vulnerabilities and remediation strategies tailored for both technical teams and executive stakeholders.
Guide clients toward effective security improvements aligned with standards like NIST, CIS, and OWASP.
Contribute actively to threat simulations, purple teaming exercises, and security maturity projects.
Share your expertise in labs, workshops, and Capture The Flag (CTF) events.
Support innovation in threat intelligence platforms, awareness initiatives, and proactive monitoring services.
What you’ll bring
Proven experience in ethical hacking, penetration testing, or red teaming.
Proficiency with Burp Suite, Metasploit, Nmap, Cobalt Strike, and similar tools.
Strong scripting or programming skills (Python, PowerShell, Bash).
In-depth understanding of cloud attack techniques and defense strategies.
Solid grasp of networking, system architecture, and application security.
Familiarity with frameworks such as OWASP, NIST, MITRE ATT&CK, and CIS.
Clear, effective communication skills in Dutch (C2 level).
Proactive mindset, creativity in problem-solving, and determination to deliver actionable results.
Bonus if you have
Certifications like OSCP, CRTO, eJPT, eCPPT, GXPN, GPEN.
Cloud security certifications (AZ-500, AWS Security Specialty).
Bug bounty experience or significant programming background.
Practical details
Location: Hybrid (Remote + Netherlands-based office/client visits)
Schedule: 32–40 hours per week
Salary: €54,000–€86,400 gross per year, based on skills and experience, plus 8% holiday allowance
Process: Introductory call → Team interview → Technical deep-dive → Offer
Decision timeline: Typically within 5 business days
Why this is different
You shape our baseline: no outdated legacy systems, just innovative security solutions.
Real societal impact by protecting critical digital infrastructure.
Engineering-first culture where autonomy, trust, and collaboration are standard.
€2,500 annual learning budget, internal labs, cyber ranges, and open-source contribution opportunities.
Active participation in international security conferences, hackathons, and industry meetups.
Regular knowledge-sharing through workshops, deep dives, and collaborative training.
Ready to join?
Curious but not sure whether you check every box? Let’s talk—we value your approach and mindset as much as your resume.