
Sr Specialist Cybersecurity - Red Team Attack and Simulation
- Hyderabad, Telangana
- Permanent
- Full-time
- Performing formal and informal targeted “Hunts” to identify vulnerabilities.
- Actively building and participating in Red Team exercises.
- Design and execute red team engagements, simulating advanced attack scenarios to identify vulnerabilities and assess the effectiveness of security measures.
- Conduct penetration tests on networks, applications, and physical security controls.
- Employing tactics to uncover security holes in user practices and procedures.
- Develop and execute red team strategies and methodologies to uncover potential security gaps.
- Analyze and report on findings from red team exercises, including detailed recommendations for remediation.
- Providing feedback and verification as security issues are fixed.
- Stay current with the latest security threats, attack techniques, and industry trends.
- Communicate complex security concepts to both technical and non-technical stakeholders.
- Collaborate with other security teams to improve overall security practices and incident response capabilities.
- At least 8+ years of experience in penetration testing and red team operations.
- Deep understanding of Transmission Control Protocol / Internet Protocol (TCP/IP) protocols, devices, security mechanisms and how they operate.
- Strong understanding of network security threats including APT, botnets, Distributed Denial of Service (DDoS) attacks, worms, and network exploits.
- In-depth knowledge of attack vectors, exploitation techniques, and vulnerability assessment methodologies.
- Experience with industry-standard penetration testing tools and frameworks.
- Experience with network probing/testing/analysis tools (Nessus, nmap, burp, wireshark, etc.)
- Deep technical knowledge of Windows, UNIX and Linux operating systems as both an expert user and system administrator
- Programming skills that will be used to construct, modify, and execute testing tools including shell (ksh, bash), [g]awk, Python, PERL, regex, .NET Programming, Java, C, C++, C#, PowerShell, curl, Web application development (PHP, ASP.NET, etc.)
- Comprehensive knowledge of software security testing principles, practices, and tools, experience of vulnerability assessments in a complex environment.
- Experience or familiarity with vulnerability analysis, computer forensics tools, cryptography principles
- Excellent teamwork skills for collaboration on analysis techniques, implementation, and reporting. Must be able to work both independently as well as effectively in teams of individuals with a variety of skills and backgrounds.
- Excellent written and verbal communication skills and have demonstrated ability to present material to senior officials.
- Highly self-motivated requiring little direction.
- Demonstrates creative/out-of-the-box thinking and good problem-solving skills.
- Demonstrates strong ethical behavior.
- Sense of urgency and attention to detail
- Flexible to provide coverage in US morning hours on a need-basis, and as required
- Strong knowledge of an enterprise architecture
- Ability to obtain a strong and ongoing understanding of the technical details involved in current APT threats and exploits involving various operating systems, applications and networking protocols.
- Knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups and both state and non-state sponsored threat actors.
- Understanding of cloud-based architectures and highly distributed big data architectures
- Experience with application security testing tools, such as the Metasploit framework and Burp Suite
- One or more of these certifications
- Prior experience with Telecom sector.