Red Team Opportunities

Below are 4 Open Roles: Please Review Thoroughly

Required Experience:

5

+ Years
Job Locations:

Location Restrictions:

Remote

Basic Qualifications and

Threat Intelligence Analyst

Role Description: The Threat Intelligence Analyst is responsible for identifying and assessing the capabilities and activities of cyber criminals or foreign intelligence entities.

Skills: Research skills, data analysis, familiarity with cybersecurity threats, strong written and oral communication, proficiency with threat intelligence platforms and security technologies, ability to use Azure Sentinel for threat intelligence.

Responsibilities: Gather and analyze data to understand threats, prepare reports and briefings on threat intelligence findings, support the security team in identifying and mitigating potential threats.

Qualifications: Minimum of 3 years of experience in a similar role, preferably in a financial or similar regulated sector. Proficiency in Python, PowerShell, or similar languages, and experience using Azure Sentinel.

 

Incident Response (IR) Analyst

Role Description: The IR Analyst is responsible for responding to cybersecurity incidents, mitigating their impact, and recovering systems and data.

Skills: Incident response, knowledge of common threats and vulnerabilities, digital forensics, proficiency with security technologies and incident response tools, ability to use Azure Sentinel for incident response.

Responsibilities: Respond to cybersecurity incidents, perform digital forensics, mitigate the impact of incidents, recover systems and data, prepare reports on incidents and responses.

Qualifications: Minimum of 3 years of experience in a similar role, preferably in a financial or similar regulated sector. Proficiency in Python, PowerShell, or similar languages, and experience using Azure Sentinel.

 

Security Operations Center (SOC) Analyst

Role Description: The SOC Analyst is responsible for monitoring and analyzing the organization's security posture on an ongoing basis.

Skills: Network security monitoring, data analysis, knowledge of common threats and vulnerabilities, proficiency with security technologies and monitoring tools, ability to use Azure Sentinel for security monitoring.

Responsibilities: Monitor the organization's networks for security incidents, analyze security data to identify threats, respond to security incidents, prepare reports on security monitoring findings.

Qualifications: Minimum of 5 years of experience in a similar role, preferably in a financial or similar regulated sector. Proficiency in Python, PowerShell, or similar languages, and experience using Azure Sentinel.

 

Red Teamer

Role Description: The Red Teamer is responsible for simulating cyber-attacks to identify vulnerabilities in the organization's security posture.

Skills: Ethical hacking, penetration testing, vulnerability assessment, knowledge of common threats and vulnerabilities, proficiency with security testing tools, ability to use Azure Sentinel for red teaming.

Responsibilities: Simulate cyber-attacks, identify vulnerabilities, report on findings, recommend mitigation strategies, assist with incident response.

Qualifications: Experience in a similar role, preferably in a financial or similar regulated sector. Proficiency in Python, PowerShell, or similar languages, and experience using Azure Sentinel. Specific years of experience is flexible, but a proven track record in ethical hacking or penetration testing is essential.

Responsibilities
Required Skills and Experience
Interested in this position?
Fill out the form below!