Security Consultant, Cloud

United States

Applications have closed

Cyderes

Cyderes offers tech-enabled managed security services for real-time risk and compliance management in modern enterprises.

View all jobs at Cyderes

Cyderes (Cyber Defense and Response) is a pure-play, full life-cycle cybersecurity services provider with award-winning managed security services, identity and access management, and professional services designed to manage the cybersecurity risks of enterprise clients.  We specialize in multi-technology, complex environments with the in speed and agility needed to tackle the most advanced cyber threats. We leverage our global scale and decades of experience to accelerate our clients’ cyber outcomes through a full lifecycle of cybersecurity services. We are a global company with operating centers in the United States, Canada, the United Kingdom, and India.
About the JobCyderes is looking for a Security Consultant to join their team. As Security Consultat you will be responsible for conducting advanced penetration testing, red teaming, and vulnerability assessments to identify and exploit security weaknesses in client environments. You will simulate real-world attacks, evaluate security posture, and provide actionable recommendations to improve defenses. This role requires strong expertise in network, application, and wireless security, as well as proficiency in scripting and automation tools. A successful candidate will possess excellent communication skills to clearly present findings and remediation strategies to both technical and non-technical stakeholders.

Responsibilities:

  • Perform advanced penetration tests across a variety of environments including networks, web applications, wireless networks, and cloud infrastructures.
  • Develop and execute red teaming exercises to simulate sophisticated threat actor tactics, techniques, and procedures (TTPs).
  • Conduct vulnerability assessments, identifying security weaknesses and prioritizing risks for clients.
  • Collaborate with internal teams and clients to develop mitigation strategies and recommend security improvements.
  • Prepare detailed reports and presentations to communicate findings and security posture assessments to both technical and non-technical audiences.
  • Continuously research and stay updated on the latest threat landscape, vulnerability exploits, and offensive security techniques.
  • Assist in the development and improvement of internal tools, scripts, and methodologies for penetration testing and automation.
  • Conduct physical security assessments by evaluating the effectiveness of locks, alarms, surveillance, and access control systems.
  • Perform social engineering tactics like tailgating, badge cloning, or other on-site penetration testing techniques to assess facility security

Requirements

  • Certifications such as OSCP, GSEC, GIAC, CPT are preferred
  • 2-3 years of experience in three of the following areas:
  • Executing network, wireless, web application, and API penetration tests
  • Experience with Active directory (AD) and Kerberos
  • Experience conducting vulnerability management and assessments
  • Experience conducting social engineering assessments
  • Experience conducting Purple Team and Red Team exercises
  • Experience with Tenable.IO, Recorded Future, PlexTrac and Cymulate preferred
  • Experience with programming using one or more of the following: Perl, Python, ruby, bash, C or C++, C#, or Java, including scripting, automation, and editing existing code
  • Developing, extending, or modifying exploits, shellcode or exploit tools
  • Reverse engineering malware, data obfuscators, or ciphers
  • Source code review for control flow and security flaws
  • General knowledge of the MITRE ATT&CK Framework
  • Thorough understanding of network protocols, data on the wire, and covert channels
  • Mastery of Unix/Linux/Mac/Windows operating systems, including bash and PowerShell
Cyderes is an Equal Opportunity Employer (EOE). Qualified applicants are considered for employment without regard to race, religion, color, sex, age, disability, sexual orientation, genetic information, national origin, or veteran status.
Note: This job posting is intended for direct applicants only. We request that outside recruiters do not contact us regarding this position.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Active Directory APIs Automation Bash C Cloud Cyber defense Exploit Exploits GIAC GSEC IAM Java Kerberos Linux Malware MITRE ATT&CK Offensive security OSCP Pentesting Perl PowerShell Python Red team Reverse engineering Ruby Scripting Security assessment Surveillance TTPs UNIX Vulnerability management Windows

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.