Security Consulting Consultant [Israel]


 

A senior red team member would be leading and participating in full “traditional” Red-Team engagements:

  • OSINT/Reconnaissance
  • Penetrating client’s internet-facing services/Phishing campaigns
  • Setting up C2 and attack infrastructure
  • Persistence, Lateral movement, PE
  • Crown jewels exfiltration
  • Reporting

Additionally, tailored engagements are part of the role - including:

  • Development of customized malware to test security awareness
  • Research & weaponizing of advanced attack techniques (PE, lateral movement, etc.)
  • Research & Bypass AV software solutions
  • Research & Generate custom attacks towards client’s internal developed systems
  • Attacking & exploiting of OT/IoT devices, Cloud environments, Cellular systems & others

Job Requirements

  • 4+ years’ experience in a hands-on security role performing red team engagements within the Financial/Defense/Hi-Tech/Military/Pharma/Telecommunications sectors
  • 2+ years’ hands-on experience with penetration testing and/or defending on at least one of the following technologies:

o Cellular equipment/networks/systems (3G/4G)

o OT devices/networks

o Medical devices

o Cloud environments

  • Strong understanding of security vulnerability assessment/testing on a wide variety of technologies & operating systems (Windows, Linux/Unix as well network devices)
  • Advance knowledge of network fundamentals
  • Coding/Scripting skills in one or more languages (C/C++, C#, Ruby, Python, PowerShell)
  • Experience with leading end-to-end projects (Scoping, Resources allocation, Supervising, Pipeline management, Deliverables)
  • Experience with research, evaluate and self-study of new security technologies & systems, embedded devices, hardware, and IoT devices
  • A high level of creativity and curiosity for knowledge is a must
  • Excellent communication skills and an ability to work independently are critical

A senior red team member would be leading and participating in full “traditional” Red-Team engagements:

  • OSINT/Reconnaissance
  • Penetrating client’s internet-facing services/Phishing campaigns
  • Setting up C2 and attack infrastructure
  • Persistence, Lateral movement, PE
  • Crown jewels exfiltration
  • Reporting

Additionally, tailored engagements are part of the role - including:

  • Development of customized malware to test security awareness
  • Research & weaponizing of advanced attack techniques (PE, lateral movement, etc.)
  • Research & Bypass AV software solutions
  • Research & Generate custom attacks towards client’s internal developed systems
  • Attacking & exploiting of OT/IoT devices, Cloud environments, Cellular systems & others

Job Requirements

  • 4+ years’ experience in a hands-on security role performing red team engagements within the Financial/Defense/Hi-Tech/Military/Pharma/Telecommunications sectors
  • 2+ years’ hands-on experience with penetration testing and/or defending on at least one of the following technologies:

o Cellular equipment/networks/systems (3G/4G)

o OT devices/networks

o Medical devices

o Cloud environments

  • Strong understanding of security vulnerability assessment/testing on a wide variety of technologies & operating systems (Windows, Linux/Unix as well network devices)
  • Advance knowledge of network fundamentals
  • Coding/Scripting skills in one or more languages (C/C++, C#, Ruby, Python, PowerShell)
  • Experience with leading end-to-end projects (Scoping, Resources allocation, Supervising, Pipeline management, Deliverables)
  • Experience with research, evaluate and self-study of new security technologies & systems, embedded devices, hardware, and IoT devices
  • A high level of creativity and curiosity for knowledge is a must
  • Excellent communication skills and an ability to work independently are critical


 

.

Post a Comment

Previous Post Next Post

Sponsored Ads

نموذج الاتصال