Red Team Offensive Security Engineer (Remote, EST or CST)
Remote
Job Id:
132954
Job Category:
Job Location:
Remote
Security Clearance:
None
Business Unit:
Piper Companies
Division:
Piper Enterprise Solutions
Position Owner:
Jason Queen
Piper Companies is seeking a Red Team Offensive Security Engineer for an award-winning, publicly traded worldwide Information Technology Organization. The Red Team Offensive Security Engineer will focus on reverse engineering, penetration testing, and security assessments of all products within the tech stack.
Responsibilities for the Red Team Offensive Security Engineer:
- Objective Setting: Define the business context, scope, and objectives of the engagement, aligning the Red Team’s success criteria with the organization’s goals.
- Reconnaissance and Threat Modeling: Gather extensive information about the target, such as IP ranges, domain names, and employee details. Use frameworks like MITRE ATT&CK to model potential threats and assess associated risks.
- Initial Access: Exploit vulnerabilities to gain initial access through techniques such as social engineering, physical attacks, or exploiting external attack surfaces.
- Establish Persistence: Maintain access by setting up backdoors, creating new accounts, and utilizing Command and Control (C2) frameworks.
- Escalation/Lateral Movement: Escalate privileges and move laterally within the organization, using defense evasion techniques and exploiting further vulnerabilities.
- Data Exfiltration: Discover, collect, and exfiltrate target data according to the defined objectives.
- Reporting and Debrief: Present a comprehensive report of findings, including an executive summary, detailed findings, control successes and failures, and recommendations for improvement.
- The tech stack includes: On-Prem (Windows and Linux), Cloud (AWS), IAM (Okta), O365, Slack, and Python
Requirements for the Red Team Offensive Security Engineer:
- At least 3 years of experience as part of a red team performing some of the responsibilities listed above
- Experience writing custom exploits
- Prior experience simulating real-world attack scenarios and Penetration Testing Web Applications
- Prior Experience working in Unix (Linux), Windows, and or Cloud Environments
- Solid understanding of Python, Go, or a similar language; must be able to code live.
- Must have the legal right to work in the United States without the need for employment sponsorship
Compensation for the Red Team Offensive Security Engineer:
- Salary Range: $140,000 - $170,000
- Full Benefits: Medical, Dental, Vision, 20 days of PTO, Sick Leave as required by Law, and 11 Federal Holidays
- This opportunity is remote but we are only considering candidates in the Eastern Standard or Central Standard Time Zones
SQL Injection (SQLi), Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), Remote Code Execution (RCE), Server-Side Request Forgery (SSRF), Broken Authentication, Session Hijacking, Insecure Direct Object References (IDOR), Security Misconfiguration, Sensitive Data Exposure, Input Validation, Privilege Escalation, Web Application Firewall (WAF) Bypass, Zero-Day Exploits, Phishing and Social Engineering, Credential Stuffing, Brute Force Attacks, Man-in-the-Middle (MitM) Attacks, API Security, Content Security Policy (CSP), HTTP Header Security, Subdomain Takeover, Directory Traversal, File Inclusion Vulnerabilities (LFI/RFI), Web Shellseecurity, Threat Intelligence, Vulnerability Assessment, Incident Response
#LI-JQ1
#LI-REMOTE
This job opens for applications on 12/23/2024. Applications for this job will be accepted for at least 30 days from the posting date