Home

Job Title: cyber Security SME || VISA: ANY || Location: Remote at Remote, Remote, USA
Email: [email protected]
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=2095916&uid=

From:

Saurabh Tomar,

Arkaya Infotech

[email protected]

Reply to:   [email protected]

Role : Cyber Security SME/Red & Purple Team/Capital Markets or Insurance

Location : Remote 100%

Visa : USC/GC/GCEAD/H4EAD

MOI : Video
LinkedIn

OFFENSIVE RED & PURPLE TEAMING + FINANCIAL SERVICES OR INSURANCE*** We need: A senior (12+ Years) Cyber security OFFENSIVE SME with advanced skills in information security, focusing on threat detection, incident response, and adversary simulation (red and purple teaming) as well as proven ability to lead and develop threat hunting, detection engineering, and offensive security programs. Candidates must have Hands-on experience with offensive security tools such as Cobalt Strike, Mythic, Evilginx, Outflank C2, and OST as well as being proficient in multiple programming languages including Python, C#, C/C++ and Golang and familiarity with Windows/MacOS internals. Proficient in infrastructure automation using Terraform, Ansible, and CloudFormation as well as SIEM and EDR platforms, including but not limited to Splunk, Sumologic, and CrowdStrike Falcon EDR/Logscale. Certifications are required. THIS IS A HIGH-LEVEL POSITION THAT WILL FACE THE business so excellent communication skills are required as well as experience in large well-known enterprises. **** CANDIDATES MUST HAVE RECENT EXPERIENCE WITH FINANCIAL SERVICES/CAPITAL MARKETS OR INSURNCE

      Preferred Certifications

Offensive Security Certified Professional (OSCP)

Certified Red Team Operator (CRTO)

GIAC Certified Cloud Forensics Responder (GCFR)

GIAC Certified Forensics Analyst (GCFA)

Certified Red Team Leader (CRTL)

*** Please make sure that each submittal includes:

Drivers license or State ID

Link to the candidates LinkedIn account.

Below submittal Format

*** Candidate Must Haves on a resume and for submittal:

1. How many years working with: Cyber Security SME

2. How many years working with: Red and Purple Teaming/Lead

How many years working with: Banking/Capital Markets/Financial services or Insurance

3. How many years working with: Offensive tools Cobalt Strike, Mythic, Evilginx, Outflank C2, and OST

4. How many years working with: Python, C#, C/C++ and Golang

5. How many years working with: SIEM Tools - Splunk, Sumologic, and CrowdStrike Falcon EDR/Logscale

Job Description:

Within our Enterprise Cybersecurity organization, you will work closely with the Security Intelligence team and be responsible for leverage real world adversarial techniques to perform pen tests and simulate attacks on existing and upcoming services spanning across applications, servers, and end-user assets.

The Team

Within the Security Operations Center, partner with Incident Response Teams for Red/Purple Team assessments and work with Security Intelligence to identify and test real world adversarial tactics, techniques, and procedures.

The Impact

Utilize both manual and automated methods to conduct penetration tests and to determine a risk score and recommend mitigations that can be used to reduce risk to the firm.

Key Responsibilities

Provide technical guidance and hands-on leadership in security operations, with a focus on threat detection, adversary simulation, and countermeasure development.

Lead threat research, detection, and response efforts, including the development and maintenance of advanced detection content and threat hunting missions.

Analyze and synthesize intelligence from various sources to identify risks and provide actionable insights.

Oversee and execute adversary simulation exercises (red/purple team) to evaluate and enhance security controls and incident response effectiveness.

Research and develop offensive security techniques, tools, and automation frameworks to improve simulation and testing capabilities.

Advise on threat mitigation strategies for emerging threats and vulnerabilities.

Lead and support incident response engagements and provide expert advisory on scoping, containment, and eradication strategies.

The Minimum Qualifications

Bachelors degree

8+ years of experience in information security, focusing on threat detection, incident response, adversary simulation (red and purple teaming) and/or relative experience

The Ideal Qualifications

Degree in Cyber Security, Computer Science, or Criminal Justice with a focus in Cyber Security

10+ years of experience in information security, focusing on threat detection, incident response, and adversary simulation (red and purple teaming).

Proven ability to lead and develop threat hunting, detection engineering, and offensive security programs.

Expertise in developing advanced threat detection rules, both signature-based and behavior-based analytics.

Hands-on experience with offensive security tools such as Cobalt Strike, Mythic, Evilginx, Outflank C2, and OST.

Proficient in multiple programming languages including Python, C#, C/C++ and Golang and familiarity with Windows/MacOS internals.

Proficient in infrastructure automation using Terraform, Ansible, and CloudFormation.

Proficient with SIEM and EDR platforms, including but not limited to Splunk, Sumologic, and CrowdStrike Falcon EDR/Logscale.

Strong understanding of identity management platforms like Okta, Microsoft EntraID, and Active Directory, including identity-based attacks.

Security automation expertise using Python scripting, Palo Alto Cortex XSOAR, and GitOps practices.

Preferred Certifications

Offensive Security Certified Professional (OSCP)

Certified Red Team Operator (CRTO)

GIAC Certified Cloud Forensics Responder (GCFR)

GIAC Certified Forensics Analyst (GCFA)

Certified Red Team Leader (CRTL)

Regards,

Saurabh Tomar

IT Recruiter

Arkaya Infotech Inc.

Email: 

[email protected]

Katy, TX 77494

Keywords: cprogramm cplusplus csharp information technology green card Idaho Texas
Job Title: cyber Security SME || VISA: ANY || Location: Remote
[email protected]
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=2095916&uid=
[email protected]
View All
02:16 AM 21-Jan-25


To remove this job post send "job_kill 2095916" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]


Time Taken: 1

Location: ,