A red team serves cyber-attack simulation as an attacker in real time, using the same techniques as an attacker may use to evade detection.
Test the security control/ data centre defences and validates the effectiveness of the internal security team. This test not just identifies the security vulnerabilities but finds the possible way that may be used by an attacker to compromise the overall security.
Responsibilities:
1. Conduct real time cyber-attack simulations as part of the RED team activity.
2. Perform Cover, overt and specialised Red Team assessment.
3. Perform manual testing of web applications.
4. Modify or write an exploit/ payload to bypass the security solutions.
5. Manage the Projects independently or in minimal supervision.
6. Prepare Threat Intelligence reports for newly discovered threat agents, exploits, attacks.Conduct vulnerability Assessment and Penetration Testing for web applications, Network, Web/ NW API, mobile applications, thick-client applications, Wireless and handheld devices.
7. Conduct a security configuration review for web, mobile and thick client applications.Conduct configuration reviews for network devices including server OS, DB, Firewall, routers, Switches and other security devices/components. Conduct source-code review using automated and manual approach. Conduct threat base / incident base investigation to identify the root cause. Analyse data, such as logs or packet captures, from various sources within the corporate / enterprise and prepare conclusions regarding past and future security incidents. Conduct red team assessment using latest techniques. Work with implementation/ product partners and manage the project/ timelines. Prepare and present the assessment / audit reports to management and client. ensure timely delivery of status updates and final reports to clients. ensure high quality service delivery for security compliance
Requirement/Skills:
1. Minimum Bachelor degree in Computer Science / IT
2. 3 to 7 years hands-on working experience in Red Team operations and/or in web, network Penetration Testing in an enterprise, military or law enforcement environment. (required)
3.In-depth security knowledge on one of the following: Active Directory, Critical Infrastructure, or Cloud Infrastructure.
4. Hands-on experience with well-known Red Team tools like Cobalt Strike, Metasploit, Bloodhound, Mythic etc. (required)
5. Proficiency with at least one scripting language (e.g. Python, Bash, PowerShell). (required)
6. At least one of the following certifications or a similar one will be a plus:
7. Security Certifications (Any One): OSCP, OSCE, OSED.
8. CRTP (Certified Red Team Professional) SANS GDAT, GXPN, GPEN
9. Experience carrying out social-engineering assessments
10. Skilled in crafting bypass script for AV/EDR
Interested candidate can share resume on po********a@63****s.com
