Home

Cyber Security SME-Red & Purple Team - Remote -GC and USC at Remote, Remote, USA
Email: [email protected]
|
From:

sunny,

Source Infotech Inc

[email protected]

Reply to:   [email protected]

Hi,

Hope you are doing well,

Please find the details of Requirement,

Cyber Security SME/Red & Purple Team

Required Location: Remote 100%

Candidate Visas Accepted

: No Opt. H1B

OFFENSIVE RED & PURPLE TEAMING + FINANCIAL SERVICES OR INSURANCE
*** We need: A senior (12+ Years) Cyber security OFFENSIVE SME with advanced skills in information security, focusing on

threat detection, incident response, and adversary simulation

(red and purple teaming)
as well as proven ability to lead and develop threat hunting, detection engineering, and offensive security programs. Candidates must have Hands-on experience with

offensive security tools such as CobaltStrike, Mythic, Evilginx, Outflank C2, and OST
as well as being proficient in multiple programming

languages including Python, C#, C/C++ and GoLang
and familiarity with Windows/MacOS internals. Proficient in infrastructure automation

using Terraform, Ansible, and CloudFormation
as well as

SIEM and EDR platforms, including but not limited to Splunk, SumoLogic, and CrowdStrike Falcon
EDR/LogScale.

Certifications are required. ****
CANDIDATES MUST HAVE RECENT EXPERIENCE WITH FINANCIAL SERVICES/CAPITAL MARKETS OR INSURNCE

      Preferred Certifications

Offensive Security Certified Professional (OSCP)

Certified Red Team Operator (CRTO)

GIAC Certified Cloud Forensics Responder (GCFR)

GIAC Certified Forensics Analyst (GCFA)

Certified Red Team Leader (CRTL)

*** Candidate Must Haves on a resume and for submittal:

1. How many years working with: Cyber Security SME

2. How many years working with: Red and Purple Teaming/Lead

How many years working with: Banking/Capital Markets/Financial services or Insurance

3. How many years working with: Offensive tools CobaltStrike, Mythic, Evilginx, Outflank C2, and OST

4. How many years working with: Python, C#, C/C++ and GoLang

5. How many years working with: SIEM Tools - Splunk, SumoLogic, and CrowdStrike Falcon EDR/LogScale       

Job Description:

Within our Enterprise Cybersecurity organization, you will work closely with the Security Intelligence team and be responsible for leverage real world adversarial techniques to perform pen tests and simulate attacks on existing and upcoming services spanning across applications, servers, and end-user assets.
The Team
Within the Security Operations Center, partner with Incident Response Teams for Red/Purple Team assessments and work with Security Intelligence to identify and test real world adversarial tactics, techniques, and procedures.
The Impact
Utilize both manual and automated methods to conduct penetration tests and to determine a risk score and recommend mitigations that can be used to reduce risk to the firm.
Key Responsibilities

Provide technical guidance and hands-on leadership in security operations, with a focus on threat detection, adversary simulation, and countermeasure development.

Lead threat research, detection, and response efforts, including the development and maintenance of advanced detection content and threat hunting missions.

Analyze and synthesize intelligence from various sources to identify risks and provide actionable insights.

Oversee and execute adversary simulation exercises (red/purple team) to evaluate and enhance security controls and incident response effectiveness.

Research and develop offensive security techniques, tools, and automation frameworks to improve simulation and testing capabilities.

Advise on threat mitigation strategies for emerging threats and vulnerabilities.

Lead and support incident response engagements and provide expert advisory on scoping, containment, and eradication strategies.

The Minimum Qualifications

Bachelors degree

8+ years of experience in information security, focusing on threat detection, incident response, adversary simulation (red and purple teaming) and/or relative experience

The Ideal Qualifications

Degree in Cyber Security, Computer Science, or Criminal Justice with a focus in Cyber Security

10+ years of experience in information security, focusing on threat detection, incident response, and adversary simulation (red and purple teaming).

Proven ability to lead and develop threat hunting, detection engineering, and offensive security programs.

Expertise in developing advanced threat detection rules, both signature-based and behavior-based analytics.

Hands-on experience with offensive security tools such as CobaltStrike, Mythic, Evilginx, Outflank C2, and OST.

Proficient in multiple programming languages including Python, C#, C/C++ and GoLang and familiarity with Windows/MacOS internals.

Proficient in infrastructure automation using Terraform, Ansible, and CloudFormation.

Proficient with SIEM and EDR platforms, including but not limited to Splunk, SumoLogic, and CrowdStrike Falcon EDR/LogScale.

Strong understanding of identity management platforms like Okta, Microsoft EntraID, and Active Directory, including identity-based attacks.

Security automation expertise using Python scripting, Palo Alto Cortex XSOAR, and GitOps practices.

Thanks,

Sunny

IT Recruiter

Source InfoTech Inc.,

Email: [email protected]

Keywords: cprogramm cplusplus csharp information technology
Cyber Security SME-Red & Purple Team - Remote -GC and USC
[email protected]
[email protected]
View All
09:53 PM 15-Jan-25


To remove this job post send "job_kill 2082589" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]


Time Taken: 1

Location: ,