Lead Security Red Team Operations Engineer

Request Technology - Robyn Honquest

Posted on Jan 31, 2024 by Request Technology - Robyn Honquest
CT
IT
Immediate Start
Annual Salary
Contract/Project

NOTE" Employers and 3rd parties can email me resumes directly but do NOT call me.

LEAD SECURITY RED TEAM OPERATIONS ENGINEER

  • Experience developing custom red team tools across the entire spectrum of an operation: from the initial access exploits, to the core implant, the implant features to achieve mission objectives, control posts, and everything in between using programming languages including C and Python.
  • Experience automating repeated tasks with building CI/CD pipelines in Gitlab.
  • Experience developing automation tools using distributed workers using technologies such as RabbitMQ and Celery. Full stack development experience a plus.

REMOTE

As the lead you will use tools and develop tools. Heavy applications with python Java C++ etc. infrastructure vulnerabilities. This is not just applications it's enterprise offense side finding, bugs, scanning tools. Must come from a large enterprise environment made up of linux windows vmware ad azure aws Microsoft. automation background must have written code in the past or currently.

RESPONSIBILITIES

  • Develops Red Team processes, strategies, engagements, and roadmaps with an eye toward the unique needs of the business and industry.
  • Builds custom exploits, toolkits, and cloud infrastructure to automate common tasks with appropriate logging and opsec.
  • Works with internal teams to measure and improve detection and response.
  • Demonstrates low-level development skills in the areas of exploitation and capability development.
  • Able to effectively emulate a variety of threat actor profiles.
  • Designs, builds, and leads a team that ensures the security of enterprise data and systems by developing enterprise information security solutions.
  • Creates and updates a view of IT assets, related attack surfaces, and threat actors to illustrate the flow of data and associated security threats.
  • Researches, designs, and develops new enterprise technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors.
  • Serves as a security expert in application development, database design, network, and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices.
  • Works with Enterprise Architects and other functional area architects and security specialists to ensure adequate security solutions are in place throughout all IT systems and platforms to mitigate identified risks sufficiently and support business objectives.
  • Serves as an expert in platform, application, storage, network, virtualization, cloud and mobile security best practices.
  • Exercises thought leadership in the creation and maintenance of security architectures.

QUALIFICATIONS

  • A strong, complete, and working understanding of architecture-level information security and appropriate use enforcement technology solutions including advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application and remote API security, fine-grained application authorization and access control, security event visualization, big data user and entity behavior analytics, active adversary deception, and others.
  • A strong working understanding of contemporary security theory and application (including vulnerabilities, exploitation techniques and attack vectors).
  • Strong understanding of systems development life cycle to lead multifunctional projects or initiatives.
  • Knowledge of laws, regulations, and standards relevant to the US Healthcare industry.
  • Excellent written and verbal communication skills (including technical writing, documentation development, process mapping, and visualization). Must be able to effectively communicate technical concepts to a non-technical audience.
  • Externally recognized information security industry thought leadership and innovation accomplishments desired but not required.

Reference: 2709060688

https://jobs.careeraddict.com/post/87520121

This Job Vacancy has Expired!

Request Technology - Robyn Honquest

Lead Security Red Team Operations Engineer

Request Technology - Robyn Honquest

Posted on Jan 31, 2024 by Request Technology - Robyn Honquest

CT
IT
Immediate Start
Annual Salary
Contract/Project

NOTE" Employers and 3rd parties can email me resumes directly but do NOT call me.

LEAD SECURITY RED TEAM OPERATIONS ENGINEER

  • Experience developing custom red team tools across the entire spectrum of an operation: from the initial access exploits, to the core implant, the implant features to achieve mission objectives, control posts, and everything in between using programming languages including C and Python.
  • Experience automating repeated tasks with building CI/CD pipelines in Gitlab.
  • Experience developing automation tools using distributed workers using technologies such as RabbitMQ and Celery. Full stack development experience a plus.

REMOTE

As the lead you will use tools and develop tools. Heavy applications with python Java C++ etc. infrastructure vulnerabilities. This is not just applications it's enterprise offense side finding, bugs, scanning tools. Must come from a large enterprise environment made up of linux windows vmware ad azure aws Microsoft. automation background must have written code in the past or currently.

RESPONSIBILITIES

  • Develops Red Team processes, strategies, engagements, and roadmaps with an eye toward the unique needs of the business and industry.
  • Builds custom exploits, toolkits, and cloud infrastructure to automate common tasks with appropriate logging and opsec.
  • Works with internal teams to measure and improve detection and response.
  • Demonstrates low-level development skills in the areas of exploitation and capability development.
  • Able to effectively emulate a variety of threat actor profiles.
  • Designs, builds, and leads a team that ensures the security of enterprise data and systems by developing enterprise information security solutions.
  • Creates and updates a view of IT assets, related attack surfaces, and threat actors to illustrate the flow of data and associated security threats.
  • Researches, designs, and develops new enterprise technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors.
  • Serves as a security expert in application development, database design, network, and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices.
  • Works with Enterprise Architects and other functional area architects and security specialists to ensure adequate security solutions are in place throughout all IT systems and platforms to mitigate identified risks sufficiently and support business objectives.
  • Serves as an expert in platform, application, storage, network, virtualization, cloud and mobile security best practices.
  • Exercises thought leadership in the creation and maintenance of security architectures.

QUALIFICATIONS

  • A strong, complete, and working understanding of architecture-level information security and appropriate use enforcement technology solutions including advanced malware detection/prevention, mobile device virtualization/MDM, cloud security management, structured and unstructured database encryption, mobile application and remote API security, fine-grained application authorization and access control, security event visualization, big data user and entity behavior analytics, active adversary deception, and others.
  • A strong working understanding of contemporary security theory and application (including vulnerabilities, exploitation techniques and attack vectors).
  • Strong understanding of systems development life cycle to lead multifunctional projects or initiatives.
  • Knowledge of laws, regulations, and standards relevant to the US Healthcare industry.
  • Excellent written and verbal communication skills (including technical writing, documentation development, process mapping, and visualization). Must be able to effectively communicate technical concepts to a non-technical audience.
  • Externally recognized information security industry thought leadership and innovation accomplishments desired but not required.

Reference: 2709060688

CareerAddict

Alert me to jobs like this:

Amplify your job search:

CV/résumé help

Increase interview chances with our downloads and specialist services.

CV Help

Expert career advice

Increase interview chances with our downloads and specialist services.

Visit Blog

Job compatibility

Increase interview chances with our downloads and specialist services.

Start Test