We are seeking a Red Team Specialist to join our Exposure Management group. This role focuses on simulating real-world adversaries to evaluate the resilience of a large, complex multinational environment. The Red Team Specialist will design and execute offensive campaigns, emulating threat actors’ tactics, techniques, and procedures (TTPs), and work closely with threat intelligence, detection engineering, posture management, and incident response teams to identify weaknesses and validate defensive capabilities.
Your role:- Plan and execute red team campaigns targeting enterprise, cloud, and hybrid environments using intelligence-driven TTPs.
- Perform adversary emulation across multiple attack vectors, including phishing, lateral movement, credential abuse, persistence, and privilege escalation.
- Develop and maintain custom tools, scripts, and techniques to support red team operations.
- Collaborate with Threat Intelligence to align operations with relevant adversary profiles.
- Coordinate with Posture Management and Vulnerability Management to ensure identified exposures are tested and validated.
- Provide actionable reporting and technical debriefs to both technical stakeholders and senior leadership.
- Support purple team exercises to validate detections, response processes, and defensive improvements.
- Contribute to continuous improvement of red team methodologies, playbooks, and operational security (OPSEC).
- Bachelor’s degree in Cybersecurity, Computer Science, or related field; or equivalent.
- Minimum 5 years of experience with Bachelor's OR Minimum 3 years of experience with Master's in areas such as Security Architecture, Network Security, Cybersecurity Technology, Information Security or equivalent.
- Working knowledge of artificial intelligence concepts and practical experience applying AI or machine learning techniques within cybersecurity functions, such as threat analysis, automation, or analytics.
- 2–5 years of experience in penetration testing, offensive security, or red team operations.
- Strong grounding in IT infrastructure (networks, operating systems, identity management, cloud services).
- In-depth understanding of adversary tactics mapped to MITRE ATT&CK.
- Proficiency with offensive security tools (Cobalt Strike, Metasploit) and scripting languages (Python, PowerShell, Bash).
- Demonstrated experience in lateral movement, persistence techniques, and privilege escalation in enterprise environments.
- Experience with cloud attack paths in AWS, Azure, or GCP.
- Familiarity with Active Directory and identity attack scenarios.
- Exposure to purple team methodologies and collaboration with blue teams.
- Relevant cybersecurity certifications are highly desirable.
- Fluency in English (min C1 level)
We believe that we are better together than apart. For our office-based teams, this means working in-person at least 3 days per week. Onsite roles require full-time presence in the company’s facilities. Field roles are most effectively done outside of the company’s main facilities, generally at the customers’ or suppliers’ locations.
This role is an office role.
About PhilipsWe are a health technology company. We built our entire company around the belief that every human matters, and we won't stop until everybody everywhere has access to the quality healthcare that we all deserve. Do the work of your life to help the lives of others.
- Learn more about our business here.
- Discover our rich and exciting history here.
- Learn more about our purpose here.
If you're interested in this role and have many, but not all, of the experiences needed, we encourage you to apply. You may still be the right candidate for this or other opportunities at Philips. Learn more about our commitment to diversity and inclusion here.
Skills Required
- Bachelor's degree in Cybersecurity, Computer Science, or related field
- Minimum 5 years of experience with Bachelor's OR Minimum 3 years with Master's
- Working knowledge of AI concepts and practical experience applying AI or machine learning techniques
- 2-5 years of experience in penetration testing or offensive security
- Strong grounding in IT infrastructure
- In-depth understanding of adversary tactics mapped to MITRE ATT&CK
- Proficiency with offensive security tools
- Experience with cloud attack paths in AWS, Azure, or GCP
- Relevant cybersecurity certifications
Philips Compensation & Benefits Highlights
The following summarizes recurring compensation and benefits themes identified from responses generated by popular LLMs to common candidate questions about Philips and has not been reviewed or approved by Philips.
-
Retirement Support — Retirement support is positioned as a standout, including a strong 401(k) match (often described at 7%) alongside pensions in some contexts.
-
Flexible Benefits — Flexible benefits are emphasized through choice in health insurance options and a broad “Total Rewards” approach that combines compensation, health and wellness, and work-life support.
-
Leave & Time Off Breadth — Leave and time off breadth appears strong, with generous paid time off and policies covering parental leave, caregiving responsibilities, volunteering, and family medical leave.
Philips Insights
What We Do
Do the work of your life to help the lives of others. As a leading health technology company, it is our purpose to improve people’s health and well-being through meaningful innovation. Our goal is to improve 2.5 billion lives per year by 2030. We also strive to be the best place to work for people who share our passion, by promoting personal development, inclusion and diversity while acting responsibly towards our planet and society.







