All-In-One Scriptless Test Automation Solution!

Generic selectors
Exact matches only
Search in title
Search in content
Share on facebook
Share on twitter
Share on linkedin
Share on pinterest
Share on email

Job Details

Job Title
: Cyber Security/ Red Team Operator
Required Skills
: C2 frameworks, Cobalt Strike, CWE, EH, GIAC, GWAPT, IDS/IPS, OSCP, OWASP, penetration testing, Red/Purple team, Sec+, SIEM
Location
Duration
: 7 Months contract with possible extension

Job Description

Pay Range: $50 – $52/hr . The pay rate may differ depending on your skills, education, experience, and other qualifications.

Featured Benefits: 

  • Medical Insurance in compliance with the ACA.
  • 401(k).
  • Sick leave in compliance with applicable state, federal, and local laws.

Must Have:

  • Amazon Web Services
  • Azure Active Directory
  • Burpsuite Pro
  • Cobalt Strike
  • Python

Nice To Have:

  • Electron Framework
  • Outflank – Stage 1
  • Project Discovery Nuclei

Profile: while the role is tagged as being “junior”, the team needs rockstar level candidates w/cyber ops.

Responsibilities:

  • Conduct Offensive Cyber Security Operations: Execute covert operations to assess the organization’s security posture and readiness against cyber threats.
  • Perform Penetration Testing: Conduct comprehensive assessments of the Digital Exam Player, web applications, and other systems using both manual and automated testing techniques.
  • Engage in Purple Teaming: Facilitate collaborative exercises with internal Incident Response and Threat Hunt teams to enhance the organization’s defensive capabilities.
  • Execute Multi-stage Attack Simulation: Coordinate with Red Team members to simulate attacks, including initial access, privilege escalation, lateral movement, and data exfiltration.
  • Create Threat Mimicry: Mimic adversary tactics, techniques, and procedures (TTPs) to assess defensive capabilities and identify weaknesses.
  • Conduct Security Control Evaluation: Evaluate the detection and response capabilities of security controls, such as SIEM, EDR, and network monitoring solutions.
  • Investigate C2 Techniques: Research and integrate new C2 techniques and tools to evade detection and enhance operational capabilities. Monitor and analyze C2 traffic for anomalies and indicators of compromise (IOCs).
  • Provide Technical Guidance: Provide technical expertise and guidance to the vulnerability management team on building custom scanning signatures and techniques. Also, guide threat hunters on adversary behaviors, attack techniques, and IOCs.
  • Contribute to Culture Building: Foster a culture of collaboration and continuous learning within all Cyber Operations teams.
  • Stay abreast of emerging threats and vulnerabilities affecting web applications or endpoints and incorporate them into assessment methodologies.

Must have:

  • A bachelor’s in computer science or equivalent work experience
  • 5 years in IT, with at least 1 year in offensive security
  • Experience in Red/Purple team exercises and penetration testing
  • Proficiency in C2 frameworks (e.g., Cobalt Strike)
  • Certifications like CEH, OSCP, GWAPT, Sec+, or GIAC preferred
  • Familiarity with open-source/commercial offensive security tools, and cloud-based attacker infrastructure deployment.
  • Strong understanding of web application CWEs, OWASP Top 10, Threat Intelligence, and Threat Profiling
  • Experience with IDS/IPS, SIEM, network defense tools, DLP technologies, network security architecture, and enterprise anti-virus/malware solutions
  • Proficiency with Burp Suite and testing Web Applications and API’s.
  • Familiarity/experience with Electron framework preferred
  • Ability to maintain discretion and integrity at all times
  • Ability to work in the US without sponsorship.

Required Details

Experience
: 3 Years
Travel Required
: No
Clearance Required
: No

Contact Details

Contact person
: Anil Kumar
Phone
: 678-203-2570
Website
: https://suntechnologies.com

Apply for Job

India Job Inquiry / Request Form

US Job Inquiry / Request Form