Sr Specialist Cybersecurity - Red Team Attack and Simulation
IND:AP:Hyderabad / Atria Building, Plot 17 - Adm: Atria Building, Plot No 17, India
AT&T
Shop deals on new phones, including iPhone 16 & Galaxy S25, unlimited data plans & AT&T Fiber. Get 24/7 support, pay bills, and manage your account online.Job Description:
About the Company:
Join AT&T and reimagine the communications and technologies that connect the world. Our Chief Security Office ensures that our assets are safeguarded through truthful transparency, enforce accountability and master cybersecurity to stay ahead of threats. Bring your bold ideas and fearless risk-taking to redefine connectivity and transform how the world shares stories and experiences that matter. When you step into a career with AT&T, you won’t just imagine the future-you’ll create it.
About the Job:
As part of the AT&T Governance Enforcement, Assessment and Testing, Third Party Risk, and Emerging Technology Cyber Organization (GATE), you will support the Assessment and Testing Team by designing and executing Red team engagements to simulate advanced attack scenarios, identify vulnerabilities, and assess security measures.
In this role, you participate in sophisticated Red Team exercises aimed at uncovering vulnerabilities across our networks, systems, applications, and processes. As an innovative thinker, you will go beyond standard vulnerability assessments, developing and utilizing unique tools and techniques to identify and exploit security gaps.
Your primary responsibilities will involve conducting comprehensive Red Team exercises to identify vulnerabilities in diverse environments such as cloud-hosted and web-based applications, API interfaces, databases, big data environments, networks, computer systems, mobile applications, Software Defined Networks, and IoT devices and systems. You will design and develop custom tools and methodologies to enhance our security testing capabilities and employ creative tactics to uncover weaknesses, including poor user practices and weak security methods. Working collaboratively with other Red Team members and Security Analysts, you will identify and exploit security issues, characterize cyber-attack vectors, and discover related vulnerabilities, providing actionable recommendations for remediation.
In addition, you will be required to stay abreast of the latest vulnerabilities and exploit techniques, continuously adapting your tools and methodologies to address emerging threats and evolving security landscapes. Your role will also involve documenting and communicating security findings in both written and verbal formats, using your insights to inform management, drive security strategies, notify affected customers, and advise network operations and other business units on security issues and recommended solutions.
Experience Level: 8+ years.
Location: Hyderabad
Responsibilities Include:
- Performing formal and informal targeted “Hunts” to identify vulnerabilities.
- Actively building and participating in Red Team exercises.
- Design and execute red team engagements, simulating advanced attack scenarios to identify vulnerabilities and assess the effectiveness of security measures.
- Conduct penetration tests on networks, applications, and physical security controls.
- Employing tactics to uncover security holes in user practices and procedures.
- Develop and execute red team strategies and methodologies to uncover potential security gaps.
- Analyze and report on findings from red team exercises, including detailed recommendations for remediation.
- Providing feedback and verification as security issues are fixed.
- Stay current with the latest security threats, attack techniques, and industry trends.
- Communicate complex security concepts to both technical and non-technical stakeholders.
- Collaborate with other security teams to improve overall security practices and incident response capabilities.
Required skills:
- At least 8+ years of experience in penetration testing and red team operations.
- Deep understanding of Transmission Control Protocol / Internet Protocol (TCP/IP) protocols, devices, security mechanisms and how they operate.
- Strong understanding of network security threats including APT, botnets, Distributed Denial of Service (DDoS) attacks, worms, and network exploits.
- In-depth knowledge of attack vectors, exploitation techniques, and vulnerability assessment methodologies.
- Experience with industry-standard penetration testing tools and frameworks.
- Experience with network probing/testing/analysis tools (Nessus, nmap, burp, wireshark, etc.)
- Deep technical knowledge of Windows, UNIX and Linux operating systems as both an expert user and system administrator
- Programming skills that will be used to construct, modify, and execute testing tools including shell (ksh, bash), [g]awk, Python, PERL, regex, .NET Programming, Java, C, C++, C#, PowerShell, curl, Web application development (PHP, ASP.NET, etc.)
- Comprehensive knowledge of software security testing principles, practices, and tools, experience of vulnerability assessments in a complex environment.
- Experience or familiarity with vulnerability analysis, computer forensics tools, cryptography principles
- Excellent teamwork skills for collaboration on analysis techniques, implementation, and reporting. Must be able to work both independently as well as effectively in teams of individuals with a variety of skills and backgrounds.
- Excellent written and verbal communication skills and have demonstrated ability to present material to senior officials.
- Highly self-motivated requiring little direction.
- Demonstrates creative/out-of-the-box thinking and good problem-solving skills.
- Demonstrates strong ethical behavior.
- Sense of urgency and attention to detail
- Flexible to provide coverage in US morning hours on a need-basis, and as required
Desirable skills:
- Strong knowledge of an enterprise architecture
- Ability to obtain a strong and ongoing understanding of the technical details involved in current APT threats and exploits involving various operating systems, applications and networking protocols.
- Knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups and both state and non-state sponsored threat actors.
- Understanding of cloud-based architectures and highly distributed big data architectures
- Experience with application security testing tools, such as the Metasploit framework and Burp Suite
- One or more of these certifications
- BS/MS degree in Computer Science, Cyber Security, Engineering, or related technical field
- Prior experience with Telecom sector.
Additional information (if any): Need to be flexible to provide coverage in US morning hours
#Cybersecurity
Weekly Hours:
40Time Type:
RegularLocation:
IND:AP:Hyderabad / Atria Building, Plot 17 - Adm: Atria Building, Plot No 17It is the policy of AT&T to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state or local law. In addition, AT&T will provide reasonable accommodations for qualified individuals with disabilities. AT&T is a fair chance employer and does not initiate a background check until an offer is made.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: APIs Application security APT ASP.NET Bash Big Data Burp Suite C CEH Cloud Computer Science Cryptography DDoS Exploit Exploits Forensics GIAC Governance GPEN Incident response IoT Java Linux Metasploit Nessus NetOps Network security Nmap Offensive security OSCP Pentesting Perl PHP PowerShell Python Red team TCP/IP UNIX Vulnerabilities Windows
Perks/benefits: Career development Flex hours Transparency
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.