Day To Day Responsbilities:
Conduct adversary simulations, penetration tests, and red team engagements using tools like Metasploit, Cobalt Strike, and BloodHound. They will exploit network vulnerabilities in Juniper, Cisco, Arista, Nokia, and similar routers and bypass Palo Alto/Juniper SRX firewalls. Responsibilities include developing exploits and automation scripts in Python, PowerShell, Bash, or C, testing network segmentation and ACL security, and conducting MITRE ATT&CK-based attack chains. They may also contribute to security research, vendor collaboration, and security standardization efforts.
Must Have:
- 5-8 years in large network Red Team operations:
- Penetration testing, network security, or protecting large networks
- Proficiency in BGP hijacking, ACL bypasses, segmentation flaws, and/or protecting BGP against hacking (S-BGP, RPKI, etc.)
- Hands-on with Metasploit, Cobalt Strike, BloodHound, Empire, Burp Suite
- Scripting in Python, PowerShell, Bash, or C for testing, custom exploits, and automation of repairs
- Experience assessing Juniper, Cisco, Arista, Nokia, or similar routers
- Experience with Palo Alto and/or Juniper SRX firewalls to detect and resolve bypass opportunities
- Strong Linux proficiency for offensive or defensive security operations
- Experience with network and infrastructure analysis (ISP networks, misconfiguration analysis) for offence or defense
Nice To Have:
- OSCP, OSCE, CRTO, or GPEN certification (preferred)
- Knowledge of evasion techniques for IDS/IPS, EDR, SIEM
- Familiarity with APT tactics, reverse engineering, and MFA bypass techniques
- Experience with zero-day vulnerabilities, security research, and Proofs of Concept (PoCs)
- Cloud and container security testing (AWS, Azure, Kubernetes)
- APIs for security automation and PoC development/testing
- Participation in IETF, IEEE, ORAN security standardization
- Bachelor's in Computer Science, Cybersecurity, or related field (preferred)