Join us and work with the best

Who are we looking for?

We are open for any cooperation with consultants with expertise and comprehensive experience in the field. Technical expertise and achievements in offensive cybersecurity (e.g. bug bounty, CVE, security research, publications etc) as well as several years of hands-on experience are crucial for us. Furthermore, good knowledge of English together with soft skills like thoroughness and proactive attitude to work (including report writing) are much appreciated. If you are skilled in any of our service areas but also you are self-reliant and able to deliver high quality results you are more then welcome to reach us.

What we offer?

  • a noncorporate work style,
  • interesting, valuable and developing projects,
  • working with team of experienced professionals,
  • full remote work from Poland with flexible hours,
  • competitive market rate depends on competencies (B2B cooperation preferred).

We reserve the right to respond only to selected applications.

Please include in your CV the formula of the consent to the processing of personal data, provided below:
"I hereby grant my consent to the processing by RED TEAM Sp. z o.o. for purposes of the recruitment process"

Please send applications only to the e-mail address info@redteam.pl

Blockchain security consultant

We are looking for people with experience in conducting smart contract security audits. The main task of the person on this position will include identifying security vulnerabilities in smart contracts written in Solidity for EVM based blockchains (e.g. Ethereum, BSC). Knowledge of other blockchains technologies and its security will be a plus (e.g. Solana, Rust).

Web applications pentester

Currently we are looking for self-reliant and accountable individuals with high competencies in web application penetration testing. Proficiency in mobile or infrastructure testing will be a plus.

See the Competencies of Our Team

Our team identified and responsibly disclosed multiple critical and high rated vulnerabilities in popular global utilized products. We received acknowledgements eg. from the following organisations:

Google
Apple
Oracle
VMware
Adobe
Mozilla