Get paid to do the work you'd do for free.
If you like tinkering with cyber, breaking into systems, and exploring every way a company can be compromised — we're here to teach you, sharpen you, and put you on real engagements where the work matters. We hire full-time employees and part-time contractors. We only work with the best, and we invest in the people we pick.
Offensive & technical roles
For the people who already spend their nights inside lab VMs, picking apart binaries, chaining identity misconfigurations, or watching CTF write-ups instead of TV. If hacking is the thing you'd do whether or not anyone paid you, this is the team where you finally get paid for it — on real engagements, against real targets, with senior operators in your corner who've done this at scale and want to teach you what they know.
We're equally interested in seasoned operators who can run their own engagements end-to-end and in promising junior talent we can mentor up. We hire both full-time employees and part-time contractors — whichever fits your life right now.
Roles we hire for
- Penetration testers (network, web, cloud, mobile)
- Red team operators & adversary emulation specialists
- Identity attack & defense (Active Directory, Entra ID, Okta)
- Cloud security & architecture reviewers (AWS, Azure, GCP)
- Detection engineers & threat hunters (SIEM, EDR)
- Incident response & digital forensics consultants
- Application security & secure code reviewers
- Junior & apprentice operators (mentorship track)
What gets you noticed
- A home lab, GitHub repos, blog posts, or CTF history we can look at
- Real curiosity about how things break — and how to fix them
- Certifications like OSCP, OSEP, OSWE, CRTO, GXPN, GCFA (great, not required)
- Clear writing — most of the deliverable is a report someone will act on
- Comfort being honest about what you don't yet know
Business, sales & program roles
Technical work doesn't ship without people who can scope it, sell it, run it, and keep clients happy. We hire experienced program managers, account executives, and customer-success operators who genuinely love cyber — who follow the industry, can hold their own in a technical conversation, and want to spend their career around offensive and defensive work without necessarily doing the hands-on hacking themselves.
If you've sold security services before, run a consulting practice, or shipped client engagements as a PM and the subject matter excites you — we want to hear from you.
Roles we hire for
- Account executives & business development (cyber services sales)
- Engagement / project managers
- Client success & account managers
- Marketing & demand generation (technical audiences)
- Operations, finance, and people-ops generalists
What gets you noticed
- A real track record in B2B services, consulting, or SaaS — bonus if it was cybersecurity, MSP, MSSP, or compliance
- Strong written and verbal communication — you'll talk to CISOs, CTOs, and founders
- Comfort with technical concepts — you don't need to write exploits, but you need to know what one is
- A bias toward action and ownership in a small, senior team
Don't see your exact fit?
Some of our best people came through the door wearing a job title we'd never posted. If you have unusual experience, a non-traditional path into security, or a background that doesn't fit either bucket above but you think you'd bring something here — send your resume anyway and tell us why. We read everything that comes through jobs@redhound.us.
Why people stay here
Red Hound is a small senior team. We don't grow by hiring fast — we grow by hiring people we trust to run their own engagements and represent the firm in front of a CISO on day one. That selectivity is the thing that makes the work good.
What you get
- Real work, real impact. Engagements that move the needle for real customers — not bench time on a shelf project.
- Mentorship from operators. Pair with senior practitioners who've run programs at Fortune 500s and want to teach.
- Variety. Different industries, different stacks, different threat models — every quarter looks different.
- Flexible engagement models. Full-time or part-time contractor — whichever fits the season of your life.
- Investment in your growth. Training, certs, and lab time are part of the deal — we want you sharper next year than this year.
Who's eligible
We are currently only hiring candidates based in the United States who already have permanent authorization to work in the US. We do not sponsor work visas at this time. We hire across most US time zones for fully remote roles, with occasional travel to client sites.
The fine print
- US-based candidates only
- Permanent US work authorization required (citizen, permanent resident, or equivalent)
- No visa sponsorship at this time
- Background check required before client engagement
- Equal opportunity employer — we hire on merit, character, and fit
How to apply
No application form, no pipeline tracker, no ATS keyword game. Send your resume to jobs@redhound.us. A real human on our team reads every email.
Make it easy on us
- Attach your resume as a PDF
- In the body, tell us which track you're applying to — offensive/technical, business, or open
- Say whether you want full-time or contract
- If you have a GitHub, blog, CTF profile, or sample report you can share — please link it
- Confirm you're US-based and authorized to work in the US
What happens next
- We read every resume that comes in — usually within a week
- If there's a fit, we'll set up a 30-minute intro call
- Strong candidates move to a working session: technical for offensive roles, scenario walk-through for business roles
- Final round meets the rest of the team
- If it's not a fit right now, we'll tell you — and we'll remember you for later
Ready when you are.
Send your resume to jobs@redhound.us. Tell us a bit about yourself. We'll take it from there.
