Engineer - threat research (MITRE)
Taipei, Taiwan
Trend Micro
Cybersicherheitsplattform auf KI-Basis mit XDR, MDR, Cloud- und Netzwerksicherheit; 62 Niederlassungen weltweit; die deutsche Niederlassung befindet sich in Garching im Umkreis von München.Join Trend ‧ Join New Generation
趨勢科技 - 全球雲端資安領航者 / 全亞洲最大軟體公司 / 企業版圖橫跨五大洲 / 趨勢全球研發基地在台灣
===============================================================
Introduction:
As a Red Team Specialist focused on MITRE evaluations, you will be part of a dedicated team tasked with enhancing our solution by simulating sophisticated cyber-attacks based on the MITRE evaluations scopes. You will help prepare, conduct, and analyze controlled red team exercises aimed at testing and improving our solutions before the official MITRE evaluations.
Key Responsibilities:
- Design, deploy and maintain the cyber range using AWS or Azure cloud, based on the scope of tests published by MITRE
- Manage, configure, and troubleshoot Windows environment, including Active Directory.
- Develop and execute realistic cyber-attack scenarios based on the MITRE evaluation scopes to identify the gaps and test the effectiveness of our solutions.
- Conduct several dry runs leading up to the MITRE evaluations, ensuring thorough preparation and refinement of tactics and strategies.
- Collaborate with other solution teams to assess the impact of simulated attacks and refine defensive strategies.
- Document findings and provide detailed feedback to enhance our threat detection and response capabilities.
- Participate in post-exercise debriefings and contribute to continuous improvement initiatives.
- Stay updated with the latest cybersecurity trends and updates to the MITRE ATT&CK framework.
Required Skills and Qualifications:
- Strong knowledge of Windows administration and Active Directory management.
- Familiarity with cloud integration and hybrid environments.
- Proven experience in red team operations and familiarity with tools and techniques used in offensive cybersecurity.
- In-depth knowledge of the MITRE ATT&CK framework and experience in applying it to real-world scenarios.
- Strong ability to develop and simulate complex cyber-attack scenarios and manage red team exercises.
- Excellent analytical and problem-solving skills, with the ability to think like both an attacker and a defender.
- Strong communication and collaboration skills, capable of working effectively with cross-functional teams.
Preferred Qualifications:
- Certifications such as OSCP, CEH, or other relevant cybersecurity certifications.
- Experience with scripting and programming languages such as Python, PowerShell, or Bash.
- Prior experience participating in MITRE ATT&CK evaluations or similar cybersecurity assessment frameworks.
- Experience with multi-cloud or hybrid environments.
===============================================================
連結智慧 守護世界 --- Connected Intelligence for Securing a Connected World
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory AWS Azure Bash CEH Cloud MITRE ATT&CK OSCP PowerShell Python Red team Scripting Threat detection Threat Research Windows
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.