Red Team Security Engineer - Prishtine, Kosovo
Hybrid - Prishtine, Kosovo
Wasabi Technologies
With Wasabi, you pay only for what you store. Enjoy the freedom to access your data whenever you want, without fees for egress or API requests.Role Description: Red Team Security Engineer
Role Purpose:
As a Red Team Security Engineer, you will play a critical role in adversary emulation, offensive security, security operations and other security-related engineering projects to proactively identify and mitigate threats to Wasabi Cloud Storage Platform. You will conduct full-scope Red Team engagements, penetration tests, and attack simulations while also contributing to the Wasabi Security Team in Security Network Operations Center (SNOC) activities, and other security-related engineering activities, including threat hunting, incident analysis, and detection engineering. By leveraging deep expertise in cloud security, Kubernetes, API exploitation, and adversary tactics, you will help strengthen Wasabi’s security posture by continuously testing and refining defenses. Your role requires a balanced approach by combining offensive security skills with defensive collaboration, ensuring Wasabi is well-prepared against real-world cyber threats.
*Principals only. No recruiters.
Responsibilities:
- Conduct full-scope Red Team engagements, including network, application, cloud infrastructure attacks, and API/Web security assessments.
- Simulate real-world threats against AWS, Azure, and GCP, focusing on IAM, S3, storage misconfigurations, and API abuse.
- Exploit vulnerabilities in web applications, APIs, identity systems, and other systems.
- Test containerized environments (Docker, Kubernetes, ECS, EKS) for security gaps.
- Perform lateral movement, privilege escalation, and persistence techniques in cloud and other environments.
- Bypass WAFs, EDR/XDR, and SIEM detection to test various security posture gaps.
- Conduct social engineering and phishing campaigns to evaluate employee security awareness.
- Develop and use custom tooling, scripts, and payloads for offensive security testing.
- Provide and work on detailed reports with technical findings, remediation recommendations and be able to present the findings to other peers in a concise and clear way.
- Collaborate with Blue Teams, SOC analysts, security architects, operations and, development teams to improve detection and response strategies.
- Stay updated with latest exploits, vulnerabilities, cloud security threats, and TTPs.
- Conduct threat hunting in cloud environments by analyzing logs, behavioral analytics, and SIEM detections.
- Perform forensic analysis on cloud-based attacks, identifying indicators of compromise (IoCs) and TTPs used by adversaries.
- Collaborate and work in SOC analysis, blue teams, and operations team to improve attack detection, logging and alerting.
Requirements:
- 5+ years of experience in Penetration Testing, Offensive Security or Red Teaming.
- Strong expertise in AWS, Azure, or GCP security, including IAM, S3, API Gateway, and Kubernetes security.
- Hands-on experience with general, cloud, and app exploitation tools such as. Burp Suite, Metasploit, Pacu, Stratus Red Team, CloudFox etc.
- Proficiency in Python, Go, C, Bash, and PowerShell for automating attacks and exploit development.
- Familiarity with Red Team C2 frameworks such as Sliver, Mitre ATT&CK Caldera, or Cobalt Strike.
- Experience in bypassing security controls, including WAFs, AV/EDR, and logging mechanisms.
- Understanding data exfiltration techniques, covert channels, and cloud-based persistence.
- Knowledge of MITRE ATT&CK Cloud Matrix and real-world adversary tactics.
- Certifications such as OSCP, OSEP, CRTO etc. (preferred but not required).
- Knowledge of SIEM/SOC operations, including log analysis, alert triage, and detection engineering.
Wasabi Technologies is an Equal Opportunity Employer. We prohibit discrimination and harassment of any kind based on race, color, sex, religion, sexual orientation, national origin, disability, genetic information, pregnancy, or any other protected characteristic as outlined by federal, state, or local laws.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics API Gateway APIs AWS Azure Bash Burp Suite C Cloud Cobalt Strike Docker EDR Exploit Exploits GCP IAM Kubernetes Log analysis Metasploit MITRE ATT&CK NetOps Offensive security OSCP Pentesting PowerShell Python Red team S3 Security assessment SIEM SOC TTPs Vulnerabilities XDR
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.