Operator – Blackthorn Tactical, LLC

Field Specialist • Red Team Operations • Cyber-Physical Engagements

Location: Las Vegas, NV
Classification: Contractor / Part-Time / Mission-Based
Department: Red Team Operations
Reports To: Director of Adversarial Services


Role Overview

Blackthorn Tactical Operators are the execution arm of our adversarial team — the specialists who carry out high-risk, intelligence-driven operations designed to test, exploit, and assess security controls across cyber, physical, and human environments.

Operators function at the intersection of technical capability, fieldcraft, and behavioral manipulation, using an adaptive, adversary-focused mindset to expose real-world vulnerabilities for our clients.

This is not a theoretical or academic position.
This is a mission-oriented role requiring precision, planning, improvisation, discipline, and the ability to operate under pressure without compromising safety, ethics, or client boundaries.


Mission Profile

Operators support full-spectrum red team operations including:

  • Physical intrusion testing

  • Social engineering engagements

  • Covert entry and on-site reconnaissance

  • Cyber-physical attack-path development

  • Badge cloning and RF/emulation attacks

  • OSINT collection and target profiling

  • Asset bypass operations

  • Access vector exploitation

  • Insider-threat simulation

  • Surveillance, counter-surveillance, and pattern analysis

  • Adversarial scenario execution (solo or teamed)

Operators help Blackthorn Tactical answer the real question every client fears:
“What can an intelligent adversary actually do to us?”


Core Responsibilities

1. Physical Intrusion & Covert Entry

  • Conduct reconnaissance of facilities, access points, timings, and environmental weaknesses.

  • Execute controlled intrusion attempts using covert methods.

  • Identify bypass paths for locks, access control systems, sensors, and building layouts.

  • Operate with discipline, stealth, and adherence to defined scope.

2. Social Engineering Operations

  • Execute pretext-based engagements (in-person, phone, digital) with confidence and realism.

  • Harvest credentials, badges, and insider intel without raising suspicion.

  • Role-play high-pressure social scenarios with adaptability and finesse.

3. Cyber-Physical Attack Path Execution

  • Coordinate with cyber team members to bridge physical, digital, and human vulnerabilities.

  • Support attacks involving wireless intrusion, RFID/NFC cloning, BLE impersonation, and network access points.

  • Deploy covert hardware implants where authorized.

4. Surveillance & Reconnaissance

  • Perform static and mobile surveillance with discipline.

  • Map routines, guard patterns, camera placements, and security response behavior.

  • Provide detailed reporting on target environment conditions.

5. Documentation & Reporting

  • Document findings with precision and professionalism.

  • Provide clear, actionable after-action reports (AARs).

  • Translate field observations into client advisory insights.

6. Safety & Legal Compliance

  • Maintain strict adherence to legal scope, authorization boundaries, and safety protocols.

  • Ensure zero collateral damage during engagements.

  • Uphold Blackthorn Tactical’s ethics, integrity, and professionalism at all times.


Operational Expectations

Operators are expected to:

  • Think several steps ahead — planning for contingencies, unknowns, and failures.

  • Maintain calm under pressure, stress, or unexpected outcomes.

  • Operate independently or as part of a coordinated team.

  • Use creativity and improvisation to exploit real-world gaps.

  • Maintain a high level of physical and cognitive readiness.

  • Stay aware of legal, ethical, and operational implications of all actions.

Operators must be capable of operating in environments involving:

  • Night operations

  • Dense crowds

  • Confined spaces

  • High-security corporate environments

  • High-value targets

  • Public interaction under pretext


Required Skills & Experience

Technical & Physical Skill Proficiency

You should possess working proficiency in one or more of the following:

  • Physical bypass techniques (doors, locks, access points)

  • Social engineering tactics

  • Wireless/network attack vectors

  • OSINT techniques & target profiling

  • Badge cloning (Proxmark, Chameleon Ultra, Flipper, etc.)

  • Covert reconnaissance and surveillance tradecraft

  • Improvised entry techniques

  • General security knowledge (cyber + physical)

Behavioral & Cognitive Skills

  • Above-average situational awareness

  • Strong improvisation and adaptive problem-solving

  • Ability to convincingly maintain a pretext

  • Calm under high uncertainty

  • Strong verbal and nonverbal communication

  • Professional discretion and confidentiality

Soft Skills

  • Excellent documentation and writing abilities

  • Team coordination & communication

  • Time management

  • Professional demeanor and client-facing presence


Preferred Experience

Experience in any of the following is advantageous but not required:

  • Red Team operations

  • Penetration testing

  • Law enforcement or security operations

  • Intelligence, investigations, or surveillance roles

  • Military (especially reconnaissance, HUMINT, or special operations)

  • Physical security roles

  • EMT/first responder background

  • Corporate security or insider threat programs


Recommended Certifications

(Not all are required; these are beneficial.)

Cyber & Technical

  • eCPPT / eJPT / eWPT

  • CEH

  • Pentest+

  • CompTIA Security+

  • CISSP (long-term career progression)

  • OSCP (bonus for hybrid cyber-physical operators)

Physical/Operational

  • Red Team Operator (RTO)

  • Certified Red Team Professional (CRTP)

  • Physical Security Professional (PSP)

  • LockSport / locksmithing certifications

  • SANS SEC560 / SEC588 (advantageous)

Social Engineering & OSINT

  • SANS SEC487 (OSINT)

  • Social Engineering certifications (SECOM, etc.)


Tools You Should Be Comfortable With

Operators may use or be trained on:

Physical Entry Tools

  • Lock picks

  • Shims, bypass tools

  • Under-door tools

  • Restraint escape tools

RF/Badge/Wireless

  • Chameleon Ultra

  • Proxmark3

  • Flipper Zero

  • WiFi/BLE attack platforms

Recon Tools

  • Drones (optional)

  • Covert cameras

  • SDR receivers/transmitters

OSINT Platforms

  • Maltego

  • SpiderFoot

  • Recon-NG

Training provided where needed.


Psychological Profile

Operators who succeed in this role typically display:

  • INTJ, ISTP, INTP, or ENTJ-like traits (not a requirement)

  • High pattern-recognition ability

  • Calmness under pressure

  • Logical decision-making

  • Creative problem-solving

  • Ethical discipline

  • A strategic mindset

  • Comfort with ambiguity


Environmental & Physical Requirements

  • Ability to be on your feet for extended periods

  • Ability to lift 20–40 lbs (for gear or covert hardware)

  • Ability to operate at night or in low visibility

  • Comfort with confined spaces or crowded environments

  • Ability to role-play, improvise, and adapt under pressure


Background & Clearance

  • Must pass background screening

  • Clean criminal history (no felonies or violent crimes)

  • Must sign NDA and confidentiality agreements

  • No active substance abuse issues

  • Must be legally authorized to work in the U.S.

Top-tier engagements may require enhanced screening.


Final Note

This role is not for the reckless or the curious.
It is for the disciplined, the strategic, the adaptable, and the operationally mature.

If you thrive under uncertainty, remain calm under pressure, and see the world through an adversary’s eyes — you may have what it takes to operate with Blackthorn Tactical.

Submit Resume