Connecting linkedin

W1siziisimnvbxbpbgvkx3rozw1lx2fzc2v0cy9oyw1sew4td2lsbglhbxmvanbnl2jhbm5lci1kzwzhdwx0lwpvyi5qcgcixv0

Job

Red Team Lead

  • Location

    United States

  • Sector:

    Technology

  • Job type:

    Permanent

  • Salary:

    $170,000- $200,000

  • Contact:

    Jovan Ortiz

  • Contact email:

    j.ortiz@hamlynwilliams.com

  • Salary high:

    0

  • Salary low:

    0

  • Published:

    12 days ago

  • Expiry date:

    2022-03-09

  • Startdate:

    ASAP

(Full-Remote)

You must be a U.S. Citizen or Permanent Resident in order to qualify.

The position plays a critical role within their senior leadership team, where you would mature a Red Team Program.

Responsibilities Include But Are Not Limited To:

 

  • Perform common Red-Team activities including Phishing and Social Engineering.
  • Experience leading Red and/or Purple team operations in a large enterprise, including planning and execution of multi-week operations
  • Experience performing adversarial security assessments of web applications, native applications, systems, and networks
  • Experience with execution of Red Team operations in Cloud, Mac, and Linux environments
  • Experience with execution of Red Team operations in agile software development organizations
  • Perform manual test independently using the OWASP Top 10
  • Perform white and black box testing of in-house applications and systems with a variety of commercial and opensource tools
  • Expert with common offensive security tools and techniques
  • Create and maintain evaluation and technical testing plans to proactively identify vulnerabilities, misconfigurations, and visibility shortfalls
  • Devise creative and custom exploits, solutions, and techniques to discover vulnerabilities and exploitability of the targets
  • Create a detailed report of findings and recommendations after testing is complete and present to stakeholders
  • Create a set of testing capabilities that can be provided during new IT services being deployed, major changes to critical systems, and new enhancements to applications or web services
  • Proven development of emulating known malicious actor’s common toolsets