Red Teaming Tabletop Exercise

Indonesia

Apply now Apply later

'-Conduct red team exercises and breach attack simulations to evaluate and test the organization's security infrastructure, including networks, applications, systems, and physical security controls. '-Utilize various offensive security techniques and tools to identify vulnerabilities, weaknesses, and potential attack vectors, mimicking the tactics, techniques, and procedures (TTPs) of real-world threat actors. '-Develop and execute custom exploits, payloads, and attack scenarios to demonstrate the potential impact of security breaches on the organization. '-Collaborate with the blue team (defensive security) to improve the organization's security posture by sharing findings, insights, and recommendations from red team exercises. '-Document and present clear, concise, and accurate reports detailing the results of red team exercises, including vulnerabilities, attack paths, and remediation suggestions. '-Assist in the development and improvement of red team processes, tools, and strategies to enhance the organization's offensive security capabilities. '-Stay current with the latest cybersecurity trends, technologies, and best practices through continuous learning, attending conferences, and participating in professional forums '-Adhere to ethical hacking guidelines and legal requirements to ensure responsible and lawful conduct during red team exercises. '-Education: A bachelor's degree in computer science, cybersecurity, information technology, or a related field. '-'-Relevant certifications such as OSCP, OSCE, OSWE, GPEN, GWAPT, or LPT are highly desirable. '-Experience: 2-5 years of experience in information security, cybersecurity, or a related field, with a focus on penetration testing, red teaming, or offensive security. '-Technical skills: Proficiency in various security tools and technologies (e.g., Metasploit, Burp Suite, Nmap, Wireshark), programming/scripting languages (Python, PowerShell, JavaScript, etc.), and operating systems (Windows, Linux, Kali Linux, macOS). '-Ethical hacking skills: Strong understanding of ethical hacking methodologies, vulnerability assessment, and exploit development. Familiar with security frameworks (e.g. OWASP, NIST, etc) and risk assessment & management methodologies. '-Networking skills: Solid knowledge of network protocols, architectures, and security best practices. '-Communication skills: Excellent verbal and written communication skills to effectively convey technical information and findings to both technical and non-technical stakeholders. '-Teamwork: Ability to work collaboratively within a team and across departments to achieve shared goals.
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  2  0  0
Category: PenTesting Jobs

Tags: Blue team Burp Suite Computer Science Ethical hacking Exploit Exploits GPEN GWAPT JavaScript Kali Linux MacOS Metasploit NIST Nmap Offensive security OSCE OSCP OSWE OWASP Pentesting PowerShell Python Red team Risk assessment Scripting TTPs Vulnerabilities Windows

Perks/benefits: Career development Conferences

Region: Asia/Pacific
Country: Indonesia

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.