Red Team Specialist, Information Security
Bengaluru
Applications have closed
Saviynt
Embrace Zero Trust, secure sensitive & privileged access, and stay in continuous compliance with the world’s #1 cloud identity governance platform.WHAT YOU WILL BE DOING
- Red Team Engagements: Plan, design and execute advanced red team exercises focused on AppSec, infrastructure, network security and exploit development.
- Emulate sophisticated threat actors, simulating attacks that target critical business applications, infrastructure and networks.
- Conduct stealthy penetration testing, avoiding detection by security defenses while identifying vulnerabilities and weaknesses.
- Exploit Creation and Security Testing: Develop custom exploits and tools to bypass security controls and gain unauthorized access to sensitive systems.
- Test and evaluate the effectiveness of security measures by crafting and deploying sophisticated attack vectors.
- Utilize and customize security tools including Metasploit, Safebreach, Burp Suite, Nmap, Cobalt Strike, BloodHound and more.
- Collaboration with Blue and Purple Teams: Work closely with Blue and Purple Teams to enhance threat detection, incident response and overall security posture.
- Provide insights and recommendations for improving security controls based on findings from red team activities.
- Conduct internal testing and staging of red team tests to ensure readiness and effectiveness.
- Support threat modeling and risk assessments to identify and prioritize potential attack vectors.
- Contribute to the development and refinement of security frameworks and strategies, aligning with industry standards such as MITRE ATT&CK, NIST and ISO 27001.
WHAT YOU BRING
- Qualifications:
- Education: Bachelor’s degree in Computer Science, Information Security
- Relevant certifications (e.g., OSCP, OSCE, SANS GPEN, GXPN, GICSP, GWAPT, OSWE) are highly desirable.
- Deep understanding of various attack methodologies, threat landscapes, and adversarial tactics, techniques, and procedures (TTPs).
- Experience:
- 10+ years of experience in cybersecurity, with at least 7 years of experience in a Red Team or offensive security role.
- Proven experience in Application Security (AppSec), cloud infrastructure security, network security and exploit development.
- Experience with scripting and programming languages such as Python, PowerShell, or Bash.
- Familiarity with threat modeling, risk assessment methodologies and security frameworks such as MITRE ATT&CK, NIST and ISO 27001 is a plus
- Skills:
- Strong knowledge of penetration testing tools and techniques, including Metasploit, Burp Suite, Nmap, Cobalt Strike, BloodHound, Empire, PurpleSharp, AttackIQ, MITRE Caldera, Wireshark, Kali Linux, Vulnerability Management Tools, Rapid7, Tenable, Qualys and OWASP security scanners.
- Strong understanding of network protocols, operating systems (Windows, Linux) and cloud environments AWS & Azure.
- Experience with automation, scripting (Python, Go, Shell, Bash, JS etc.) for custom testing.
- In Depth knowledge of secure coding practices.
Saviynt is an equal opportunity employer, and we welcome everyone to our team. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Application security AttackIQ Automation AWS Azure Bash Burp Suite Cloud Cobalt Strike Computer Science Exploit Exploits GICSP GPEN GWAPT GXPN Incident response ISO 27001 Kali Linux Metasploit MITRE ATT&CK Network security NIST Nmap Offensive security OSCE OSCP OSWE OWASP Pentesting PowerShell Python Qualys Red team Risk assessment SANS Scripting Threat detection Threat intelligence TTPs Vulnerabilities Vulnerability management Windows
Perks/benefits: Career development Startup environment
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.