A senior red team member would be leading and participating in full “traditional” Red-Team engagements:
- OSINT/Reconnaissance
- Penetrating client’s internet-facing services/Phishing campaigns
- Setting up C2 and attack infrastructure
- Persistence, Lateral movement, PE
- Crown jewels exfiltration
- Reporting
Additionally, tailored engagements are part of the role - including:
- Development of customized malware to test security awareness
- Research & weaponizing of advanced attack techniques (PE, lateral movement, etc.)
- Research & Bypass AV software solutions
- Research & Generate custom attacks towards client’s internal developed systems
- Attacking & exploiting of OT/IoT devices, Cloud environments, Cellular systems & others
Job Requirements
- 4+ years’ experience in a hands-on security role performing red team engagements within the Financial/Defense/Hi-Tech/Military/Pharma/Telecommunications sectors
- 2+ years’ hands-on experience with penetration testing and/or defending on at least one of the following technologies:
o Cellular equipment/networks/systems (3G/4G)
o OT devices/networks
o Medical devices
o Cloud environments
- Strong understanding of security vulnerability assessment/testing on a wide variety of technologies & operating systems (Windows, Linux/Unix as well network devices)
- Advance knowledge of network fundamentals
- Coding/Scripting skills in one or more languages (C/C++, C#, Ruby, Python, PowerShell)
- Experience with leading end-to-end projects (Scoping, Resources allocation, Supervising, Pipeline management, Deliverables)
- Experience with research, evaluate and self-study of new security technologies & systems, embedded devices, hardware, and IoT devices
- A high level of creativity and curiosity for knowledge is a must
- Excellent communication skills and an ability to work independently are critical
A senior red team member would be leading and participating in full “traditional” Red-Team engagements:
- OSINT/Reconnaissance
- Penetrating client’s internet-facing services/Phishing campaigns
- Setting up C2 and attack infrastructure
- Persistence, Lateral movement, PE
- Crown jewels exfiltration
- Reporting
Additionally, tailored engagements are part of the role - including:
- Development of customized malware to test security awareness
- Research & weaponizing of advanced attack techniques (PE, lateral movement, etc.)
- Research & Bypass AV software solutions
- Research & Generate custom attacks towards client’s internal developed systems
- Attacking & exploiting of OT/IoT devices, Cloud environments, Cellular systems & others
Job Requirements
- 4+ years’ experience in a hands-on security role performing red team engagements within the Financial/Defense/Hi-Tech/Military/Pharma/Telecommunications sectors
- 2+ years’ hands-on experience with penetration testing and/or defending on at least one of the following technologies:
o Cellular equipment/networks/systems (3G/4G)
o OT devices/networks
o Medical devices
o Cloud environments
- Strong understanding of security vulnerability assessment/testing on a wide variety of technologies & operating systems (Windows, Linux/Unix as well network devices)
- Advance knowledge of network fundamentals
- Coding/Scripting skills in one or more languages (C/C++, C#, Ruby, Python, PowerShell)
- Experience with leading end-to-end projects (Scoping, Resources allocation, Supervising, Pipeline management, Deliverables)
- Experience with research, evaluate and self-study of new security technologies & systems, embedded devices, hardware, and IoT devices
- A high level of creativity and curiosity for knowledge is a must
- Excellent communication skills and an ability to work independently are critical