Salary
💰 $120,000 - $260,000 per year
Tech Stack
AWSAzureCloudCyber SecurityFirewallsGoogle Cloud PlatformKubernetesLinuxMicroservicesPythonSDLC
About the role
- Strategic and tactical leadership for highly effective penetration testing, simulating real-world cyber-attacks (red teaming), and collaborating with defensive security teams (purple teaming).
- Conduct tactical security penetration test assessments to validate the security of company applications (web, mobile, APIs, and AI products) against OWASP Top 10 threats and work with the Application Security team to provide feedback and recommendations to increase automated capabilities.
- Design and execute advanced threat emulation scenarios, including physical, social, and digital attack vectors.
- Ensure penetration testing activities are meeting security, business, and compliance objectives and outcomes.
- Guide the team on risk assessment, prioritization, reporting, and remediation of vulnerabilities through automation.
- Collaborate with Blue Teams, Threat Intelligence, and Risk Management to ensure comprehensive attack coverage and feedback loops.
- Ensure operations align with industry regulations and compliance standards such as NIST, PCI DSS, and NYDFS.
- Champion continuous improvement and innovation in penetration testing, adversary simulation techniques, tools, and methodologies.
- Represent the Offensive Security functions in senior leadership and audit discussions as a subject matter expert.
- Offer technical leadership for 3rd party penetration testing programs by setting a high bar and overseeing vendor testing activities.
Requirements
- Mastery of vulnerability discovery and exploitation across applications, networks, and cloud using tools (e.g., Burp Suite, Metasploit), and custom scripts (Python, PowerShell).
- Advanced understanding of OWASP, MITRE ATT&CK framework, software development lifecycle (SDLC), threat modeling, red/purple teaming, and attack path development.
- Hands-on experience with tools like Cobalt Strike, Mythic, BloodHound, and AutoSploit.
- Relevant professional security certifications (e.g. from GIAC or others).
- Proven experience in achieving results efficiently through automation and establishing best practices.
- Proven track record to deliver business outcomes for meeting regulatory and compliance obligations.
- Ability to force multiply through coaching and mentorship to offensive security engineers across all functions (penetration testing, red teaming, purple teaming).